首页 > 最新文献

2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

英文 中文
Segmentation of optic nerve head images 视神经头图像的分割
Punsiri Boonyakiat, P. Silapachote
Segmentation of the optic nerve head or optic disc in digital retinal fundus photographs is a non-invasive procedure that plays an important role in early detection of abnormalities of the eyes, particularly glaucoma diseases. Developing an automatic system, we employ image processing techniques coupled with graph cut algorithms from combinatorial optimization. Avoiding the need of manual pre-segmentation for constructing an initial graph, a supervised learning approach is effectively and efficiently applied. Crucial information is extracted from a set of labeled binary masks and integrated into weight assignments of the edges of the graph. We associate the characteristically bell-shape of a Gaussian distribution with the rounded circular-shape of the optic disc. Our approach was validated and evaluated on the RIM-ONE open database. Segmentation is successful on 91.12% of the entire 169 images, achieving 91% sensitivity and 88% accuracy.
数字视网膜眼底照片中视神经头或视盘的分割是一种非侵入性手术,在早期发现眼睛异常,特别是青光眼疾病中起着重要作用。开发一个自动系统,我们采用图像处理技术与组合优化中的图切算法相结合。避免了构建初始图的人工预分割,有效地应用了监督学习方法。从一组标记的二元掩码中提取关键信息,并将其集成到图边的权重分配中。我们将高斯分布的钟形特征与视盘的圆形特征联系起来。我们的方法在RIM-ONE开放数据库上进行了验证和评估。在169幅图像中,91.12%的图像分割成功,灵敏度达到91%,准确率达到88%。
{"title":"Segmentation of optic nerve head images","authors":"Punsiri Boonyakiat, P. Silapachote","doi":"10.1109/JCSSE.2017.8025902","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025902","url":null,"abstract":"Segmentation of the optic nerve head or optic disc in digital retinal fundus photographs is a non-invasive procedure that plays an important role in early detection of abnormalities of the eyes, particularly glaucoma diseases. Developing an automatic system, we employ image processing techniques coupled with graph cut algorithms from combinatorial optimization. Avoiding the need of manual pre-segmentation for constructing an initial graph, a supervised learning approach is effectively and efficiently applied. Crucial information is extracted from a set of labeled binary masks and integrated into weight assignments of the edges of the graph. We associate the characteristically bell-shape of a Gaussian distribution with the rounded circular-shape of the optic disc. Our approach was validated and evaluated on the RIM-ONE open database. Segmentation is successful on 91.12% of the entire 169 images, achieving 91% sensitivity and 88% accuracy.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87778457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Incremental Dynamic Time Warping for person re-identification 一种用于人员再识别的增量动态时间翘曲
Wisrut Kwankhoom, P. Muneesawang
This paper presents principles and techniques of a human gesture recognition algorithm for person identification which identifies personal gait patterns recorded with a 3D depth sensing camera, in this case the Microsoft Kinect® version 2. The recorded images are analyzed against a dataset of gait gestures derived from a sample of 37 people. We compared two algorithms for analyzing movement trajectories; Sparse code and Incremental Dynamic Time Warping (IDTW). Experimental results show that the methods have an encouraging performance. When comparing the accuracy of algorithms, IDTW gave better recognition results than the Sparse code method.
本文介绍了用于人识别的人类手势识别算法的原理和技术,该算法识别由3D深度感测相机记录的个人步态模式,在本例中为微软Kinect®版本2。这些记录下来的图像将与来自37人样本的步态手势数据集进行分析。我们比较了两种分析运动轨迹的算法;稀疏代码和增量动态时间翘曲(IDTW)。实验结果表明,该方法具有良好的性能。在比较两种算法的准确率时,IDTW方法的识别效果优于稀疏编码方法。
{"title":"An Incremental Dynamic Time Warping for person re-identification","authors":"Wisrut Kwankhoom, P. Muneesawang","doi":"10.1109/JCSSE.2017.8025916","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025916","url":null,"abstract":"This paper presents principles and techniques of a human gesture recognition algorithm for person identification which identifies personal gait patterns recorded with a 3D depth sensing camera, in this case the Microsoft Kinect® version 2. The recorded images are analyzed against a dataset of gait gestures derived from a sample of 37 people. We compared two algorithms for analyzing movement trajectories; Sparse code and Incremental Dynamic Time Warping (IDTW). Experimental results show that the methods have an encouraging performance. When comparing the accuracy of algorithms, IDTW gave better recognition results than the Sparse code method.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"57 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85646551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of mobile phone interaction with large public displays 评估移动电话与大型公共显示器的互动
Patchara Pattanakimhun, W. Chinthammit, N. Chotikakamthorn
Large public displays are widely used in public spaces for serving information. The flow of the information is largely a one-way passive communication due to a lack of user-content interaction, which in some ways limits its effectiveness as an information display system. We propose a use of mobile phones as a tool to interact with a public display. Our proposed mobile-public display user interaction uses a mobile phone to control and retrieve information from a public display. In this paper we present results of a usability test of our proposed interaction, which indicated that there was a strong correlation between the information retrieval performances and the participant's level of engagement with the mobile phone.
大型公共显示器广泛应用于公共场所,提供信息服务。由于缺乏用户与内容的交互,信息流在很大程度上是单向的被动交流,这在某种程度上限制了其作为信息显示系统的有效性。我们建议使用手机作为与公共展示互动的工具。我们提出的移动-公共显示用户交互使用移动电话来控制和检索公共显示的信息。在本文中,我们展示了我们提出的交互的可用性测试结果,该结果表明,信息检索性能与参与者与手机的接触程度之间存在很强的相关性。
{"title":"Evaluation of mobile phone interaction with large public displays","authors":"Patchara Pattanakimhun, W. Chinthammit, N. Chotikakamthorn","doi":"10.1109/JCSSE.2017.8025932","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025932","url":null,"abstract":"Large public displays are widely used in public spaces for serving information. The flow of the information is largely a one-way passive communication due to a lack of user-content interaction, which in some ways limits its effectiveness as an information display system. We propose a use of mobile phones as a tool to interact with a public display. Our proposed mobile-public display user interaction uses a mobile phone to control and retrieve information from a public display. In this paper we present results of a usability test of our proposed interaction, which indicated that there was a strong correlation between the information retrieval performances and the participant's level of engagement with the mobile phone.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72912768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spam detection for closed Facebook groups 垃圾邮件检测关闭的Facebook组
Nattanan Watcharenwong, K. Saikaew
Facebook has become a major communication channel for internet users. Unfortunately, with its great popularity and a great number of users, spams are also increasing. A number of Facebook services do not require spam detection, whereas the group usage does. Group users are generally those who are interested in the same topics or purposes. Members usually share the contents of interest in the group. These characteristics enable detection of unwanted posts, referred to as spam that annoys others. It should be noted that some spam may jeopardize the group, for example, by malicious URLs. The objective of this article is to present the design concept for detecting spam in closed groups by using the combination of text features and social features, which comprised 11 features for classifying spam by applying Random Forest machine learning algorithm on 1,200 labeled posts. The result indicated 98% of spam detection efficiency. Additionally, from the feature importance, the number of likes, one of the social features, was found to be the most effective for spam detection.
Facebook已经成为互联网用户的主要沟通渠道。不幸的是,随着它的普及和大量的用户,垃圾邮件也在增加。许多Facebook服务不需要垃圾邮件检测,而群组使用则需要。组用户通常是那些对相同的主题或目的感兴趣的人。成员通常在小组中分享感兴趣的内容。这些特征可以检测到不需要的帖子,即烦人的垃圾邮件。应该注意的是,一些垃圾邮件可能会危及组,例如,通过恶意url。本文的目的是提出一种结合文本特征和社交特征来检测封闭群组中垃圾邮件的设计概念,该设计概念包括11个特征,通过对1200个标签帖子应用随机森林机器学习算法对垃圾邮件进行分类。结果表明,垃圾邮件检测效率为98%。此外,从特征的重要性来看,社交特征之一的“喜欢”数量对垃圾邮件检测最有效。
{"title":"Spam detection for closed Facebook groups","authors":"Nattanan Watcharenwong, K. Saikaew","doi":"10.1109/JCSSE.2017.8025914","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025914","url":null,"abstract":"Facebook has become a major communication channel for internet users. Unfortunately, with its great popularity and a great number of users, spams are also increasing. A number of Facebook services do not require spam detection, whereas the group usage does. Group users are generally those who are interested in the same topics or purposes. Members usually share the contents of interest in the group. These characteristics enable detection of unwanted posts, referred to as spam that annoys others. It should be noted that some spam may jeopardize the group, for example, by malicious URLs. The objective of this article is to present the design concept for detecting spam in closed groups by using the combination of text features and social features, which comprised 11 features for classifying spam by applying Random Forest machine learning algorithm on 1,200 labeled posts. The result indicated 98% of spam detection efficiency. Additionally, from the feature importance, the number of likes, one of the social features, was found to be the most effective for spam detection.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"91 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86751734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Keystroke dynamics for authentication using dynamic time warping 使用动态时间规整进行身份验证的击键动力学
M. I. W. Pramana, Suhardi, N. Kurniawan, Jaka Semibiring
Stolen credential incident is rising nowadays, most of the cyber attacks have been targeting user credential which could be easily abused. The usage of behavioral biometric is predicted to be increasing in order to encounter such act by authenticating user using multi-factor authentication of both password and behavioral biometrics to stop illegitimate user attempt. Keystroke dynamics is a behavioral biometric that can be collected efficiently from user typing behavior. This research studied about keystroke dynamic authentication system using dynamic time warping, dataset is used in testing phase along with system usability questionnaire. The method results in 17.6% equal error rate and 70 points of system usability scale.
目前,用户凭证被盗事件不断增多,大多数网络攻击的目标都是用户凭证,而用户凭证很容易被滥用。预计行为生物识别技术的使用将越来越多,通过使用密码和行为生物识别的多因素认证来对用户进行身份验证,以阻止非法用户的尝试。击键动力学是一种可以从用户输入行为中有效收集的行为生物特征。本研究采用动态时间规整的方法对按键动态认证系统进行了研究,并在测试阶段使用了数据集和系统可用性问卷。该方法的平均错误率为17.6%,系统可用性评分为70分。
{"title":"Keystroke dynamics for authentication using dynamic time warping","authors":"M. I. W. Pramana, Suhardi, N. Kurniawan, Jaka Semibiring","doi":"10.1109/JCSSE.2017.8025915","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025915","url":null,"abstract":"Stolen credential incident is rising nowadays, most of the cyber attacks have been targeting user credential which could be easily abused. The usage of behavioral biometric is predicted to be increasing in order to encounter such act by authenticating user using multi-factor authentication of both password and behavioral biometrics to stop illegitimate user attempt. Keystroke dynamics is a behavioral biometric that can be collected efficiently from user typing behavior. This research studied about keystroke dynamic authentication system using dynamic time warping, dataset is used in testing phase along with system usability questionnaire. The method results in 17.6% equal error rate and 70 points of system usability scale.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"60 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84641530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implement of GPON-FTTH network for residential condominium 住宅楼GPON-FTTH网络的设计与实现
Ronnakorn Jirachariyakool, Napat Sra-ium, S. Lerkvaranyu
This paper presents design and implement of fiber to the home (FTTH) for residential condominium based on Gigabit-capable passive optical network (GPON) ITU-T G.984 standard in order to achieve the maximum 320 subscribers and support high bandwidth for triple play service more efficiently. The proposed design complies both with power budget and rise time budget standard. Finally, the proposed design achieves the maximum 320 subscribers, average bandwidth per subscriber at 62.2 Mbps for downstream and 31.1 Mbps for upstream, power margin is above 0 and rise time budget is below 70 percent of an NRZ bit period.
本文提出了基于千兆无源光网络(GPON) ITU-T G.984标准的住宅公寓光纤到户(FTTH)的设计与实现,以实现最大用户数320,并更有效地支持高带宽的三网融合业务。本设计既符合功率预算标准,又符合上升时间预算标准。最后,提出的设计实现了最大320个用户,每个用户的平均带宽为62.2 Mbps的下行和31.1 Mbps的上行,功率余量大于0,上升时间预算低于NRZ比特周期的70%。
{"title":"Design and implement of GPON-FTTH network for residential condominium","authors":"Ronnakorn Jirachariyakool, Napat Sra-ium, S. Lerkvaranyu","doi":"10.1109/JCSSE.2017.8025942","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025942","url":null,"abstract":"This paper presents design and implement of fiber to the home (FTTH) for residential condominium based on Gigabit-capable passive optical network (GPON) ITU-T G.984 standard in order to achieve the maximum 320 subscribers and support high bandwidth for triple play service more efficiently. The proposed design complies both with power budget and rise time budget standard. Finally, the proposed design achieves the maximum 320 subscribers, average bandwidth per subscriber at 62.2 Mbps for downstream and 31.1 Mbps for upstream, power margin is above 0 and rise time budget is below 70 percent of an NRZ bit period.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86865528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Shape recognition by using Scale Invariant Feature Transform for contour 基于尺度不变特征变换的轮廓形状识别
Mathara Rojanamontien, U. Watchareeruetai
This paper proposes a novel shape feature extractor named Contour-SIFT along with a matching method that computes the similarity between two set of proposed descriptors. It allows a shape to be recognized based on automatically located outstanding local features on its contour, which are extracted from 1-D signal representations of different smoothing scales. The algorithm describes each local feature as a list of frequencies from curvature histogram, which is created from curve segment around each local position. The descriptors will give high similarity compared with a model descriptors of a similar shape. The algorithm has properties of image scaling-, translation-, and rotation-invariants. An experiment were conducted with 200 images from Flavia dataset for verification. The result of using the proposed algorithm is compared with the result of using CSS.
本文提出了一种新的形状特征提取器contourt - sift,并提出了一种计算两组描述符之间相似度的匹配方法。它允许基于自动定位轮廓上突出的局部特征来识别形状,这些特征是从不同平滑尺度的一维信号表示中提取的。该算法将每个局部特征描述为曲率直方图的频率列表,曲率直方图是由每个局部位置周围的曲线段创建的。与具有相似形状的模型描述符相比,描述符具有较高的相似性。该算法具有图像缩放不变性、平移不变性和旋转不变性。利用Flavia数据集的200幅图像进行实验验证。将该算法与CSS算法的结果进行了比较。
{"title":"Shape recognition by using Scale Invariant Feature Transform for contour","authors":"Mathara Rojanamontien, U. Watchareeruetai","doi":"10.1109/JCSSE.2017.8025910","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025910","url":null,"abstract":"This paper proposes a novel shape feature extractor named Contour-SIFT along with a matching method that computes the similarity between two set of proposed descriptors. It allows a shape to be recognized based on automatically located outstanding local features on its contour, which are extracted from 1-D signal representations of different smoothing scales. The algorithm describes each local feature as a list of frequencies from curvature histogram, which is created from curve segment around each local position. The descriptors will give high similarity compared with a model descriptors of a similar shape. The algorithm has properties of image scaling-, translation-, and rotation-invariants. An experiment were conducted with 200 images from Flavia dataset for verification. The result of using the proposed algorithm is compared with the result of using CSS.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"107 2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89694836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal verification of ABAP by Z specification 通过Z规范正式验证ABAP
Soravit Rodruksa, D. Pradubsuwun
This paper has proposed a formal verification of ABAP by Z specification. An ABAP programming language is used to create a customized program in SAP ERP. The program must satisfy a business requirement. It likely has a defect from the developed program. Since a specification is created as the business requirement and a program should have functioned as in the specification, the formal verification is needed to assure the correctness of the function in the program. Both an ABAP program and its specification are translated into Z specification and they are verified by Isabelle in order to ensure that the ABAP program conforms to its specification. We also give some experimental result to show the effectiveness of our method.
本文提出了一种基于Z规范的ABAP形式化验证方法。使用ABAP编程语言在SAP ERP中创建定制程序。该程序必须满足业务需求。它可能有一个从开发程序的缺陷。由于规范是作为业务需求创建的,并且程序应该按照规范中的功能运行,因此需要进行正式验证以确保程序中功能的正确性。ABAP程序及其规范都被翻译成Z规范,并由Isabelle进行验证,以确保ABAP程序符合其规范。实验结果表明了该方法的有效性。
{"title":"Formal verification of ABAP by Z specification","authors":"Soravit Rodruksa, D. Pradubsuwun","doi":"10.1109/JCSSE.2017.8025943","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025943","url":null,"abstract":"This paper has proposed a formal verification of ABAP by Z specification. An ABAP programming language is used to create a customized program in SAP ERP. The program must satisfy a business requirement. It likely has a defect from the developed program. Since a specification is created as the business requirement and a program should have functioned as in the specification, the formal verification is needed to assure the correctness of the function in the program. Both an ABAP program and its specification are translated into Z specification and they are verified by Isabelle in order to ensure that the ABAP program conforms to its specification. We also give some experimental result to show the effectiveness of our method.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"25 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81038168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental performance evaluation of LoRaWAN: A case study in Bangkok LoRaWAN的实验性能评价:以曼谷为例
Nuttakit Vatcharatiansakul, P. Tuwanut, C. Pornavalai
The Internet of Things (IoT) is a vision which real-world objects are part of the internet. Every object is uniquely identified, and accessible to the network. There are various types of communication protocol for connect the device to the Internet. One of them is a Low Power Wide Area Network (LPWAN) which is a novel technology use to implement IoT applications. There are many platforms of LPWAN such as NB-IoT, LoRaWAN. In this paper, the experimental performance evaluation of LoRaWAN over a real environment in Bangkok, Thailand is presented. From these experimental results, the communication ranges in both an outdoor and an indoor environment are limited. Hence, the IoT application with LoRaWAN technology can be reliable in limited of communication ranges.
物联网(IoT)是一种愿景,即现实世界的物体是互联网的一部分。每个对象都是唯一标识的,并且可以通过网络访问。将设备连接到互联网有各种类型的通信协议。其中之一是低功耗广域网(LPWAN),这是一种用于实现物联网应用的新技术。LPWAN有很多平台,如NB-IoT、LoRaWAN等。本文介绍了LoRaWAN在泰国曼谷真实环境下的实验性能评估。从这些实验结果来看,在室外和室内环境下的通信范围都是有限的。因此,采用LoRaWAN技术的物联网应用在有限的通信范围内是可靠的。
{"title":"Experimental performance evaluation of LoRaWAN: A case study in Bangkok","authors":"Nuttakit Vatcharatiansakul, P. Tuwanut, C. Pornavalai","doi":"10.1109/JCSSE.2017.8025948","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025948","url":null,"abstract":"The Internet of Things (IoT) is a vision which real-world objects are part of the internet. Every object is uniquely identified, and accessible to the network. There are various types of communication protocol for connect the device to the Internet. One of them is a Low Power Wide Area Network (LPWAN) which is a novel technology use to implement IoT applications. There are many platforms of LPWAN such as NB-IoT, LoRaWAN. In this paper, the experimental performance evaluation of LoRaWAN over a real environment in Bangkok, Thailand is presented. From these experimental results, the communication ranges in both an outdoor and an indoor environment are limited. Hence, the IoT application with LoRaWAN technology can be reliable in limited of communication ranges.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"52 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77193087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Recommender Systems for university elective course recommendation 大学选修课推荐系统
Kiratijuta Bhumichitr, S. Channarukul, Nattachai Saejiem, Rachsuda Jiamthapthaksin, K. Nongpong
Recommender Systems are an ongoing research that is applied in various domains. Course recommendation is considered a challenged domain that has not been explored thoroughly. It benefits undergraduate students who need suggestion and also enhances course selection processes during the pre-registration period. This paper introduces a recommendation system for university elective courses, which recommends the courses based on the similarity between the course templates of students. This paper utilizes two popular algorithms: collaborative based recommendation using Pearson Correlation Coefficient and Alternating Least Square (ALS), and compares their performance on a dataset of academic records of university students. The experimental results show that applying ALS in this domain is superior to collaborative based with 86 percent of accuracy.
推荐系统是一项正在进行的研究,应用于各个领域。课程推荐被认为是一个具有挑战性的领域,尚未被彻底探索。它有利于需要建议的本科生,并在预注册期间加强选课过程。本文介绍了一种基于学生课程模板相似性的大学选修课推荐系统。本文采用了两种流行的算法:基于Pearson相关系数的协同推荐和交替最小二乘法(ALS),并在大学生学习记录数据集上比较了它们的性能。实验结果表明,在这一领域应用渐近渐变算法优于基于协作的方法,准确率高达86%。
{"title":"Recommender Systems for university elective course recommendation","authors":"Kiratijuta Bhumichitr, S. Channarukul, Nattachai Saejiem, Rachsuda Jiamthapthaksin, K. Nongpong","doi":"10.1109/JCSSE.2017.8025933","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025933","url":null,"abstract":"Recommender Systems are an ongoing research that is applied in various domains. Course recommendation is considered a challenged domain that has not been explored thoroughly. It benefits undergraduate students who need suggestion and also enhances course selection processes during the pre-registration period. This paper introduces a recommendation system for university elective courses, which recommends the courses based on the similarity between the course templates of students. This paper utilizes two popular algorithms: collaborative based recommendation using Pearson Correlation Coefficient and Alternating Least Square (ALS), and compares their performance on a dataset of academic records of university students. The experimental results show that applying ALS in this domain is superior to collaborative based with 86 percent of accuracy.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"40 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80542711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1