By Topic

Computer Science and Software Engineering (JCSSE), 2013 10th International Joint Conference on

Date 29-31 May 2013

Filter Results

Displaying Results 1 - 25 of 53
  • [Title page]

    Publication Year: 2013 , Page(s): 1
    Request Permissions | PDF file iconPDF (102 KB)  
    Freely Available from IEEE
  • The 2013 10th International Joint Conference on Computer Science and Software Engineering [copyright notice]

    Publication Year: 2013 , Page(s): 1
    Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2013 , Page(s): c1
    Request Permissions | PDF file iconPDF (24379 KB)  
    Freely Available from IEEE
  • [Spine art]

    Publication Year: 2013 , Page(s): 1
    Request Permissions | PDF file iconPDF (2986 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 1 - 5
    Request Permissions | PDF file iconPDF (104 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2013 , Page(s): 1 - 3
    Request Permissions | PDF file iconPDF (92 KB)  
    Freely Available from IEEE
  • A Thai word pronunciation simulator based on DFT analysis and GA search

    Publication Year: 2013 , Page(s): 1 - 5
    Request Permissions | Click to expandAbstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    This paper aims to present and discuss the concept of a Thai word pronunciation simulator based on DFT (Discrete Fourier Transform) analysis and GA (Genetic Algorithm) search. By DFT analysis, the simulator converts the sound of a Thai word from a foreign leaner into its frames to get sound segments. The GA search on the sound segments generates a highest similarity sound value with a standard Tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of wordplay generated by reproduction of letters in social media texts

    Publication Year: 2013 , Page(s): 6 - 10
    Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Wordplay generated by letters of its original word being repeated is commonly found in social network texts. Most of the time, wordplay items of this type are ambiguous to machines in language processing tasks such as Text-to-Speech. This paper shows some statistics on the number of letters from 102,586 real social network text items and proposes a set of classification features together with a fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Sudoku puzzles with node based Coincidence algorithm

    Publication Year: 2013 , Page(s): 11 - 16
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (858 KB) |  | HTML iconHTML  

    In Evolutionary computation, Sudoku puzzles are categorized as hard combinatorial problems. It is almost impossible to solve these puzzles using only native operations of genetic algorithms. This article presents an application of Coincidence algorithm, which is an Estimation of distribution algorithms in the class of evolutionary computation that can outperform traditional algorithms on several c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Marginal noise removal for scanned document images by projection profile based method

    Publication Year: 2013 , Page(s): 17 - 20
    Request Permissions | Click to expandAbstract | PDF file iconPDF (705 KB) |  | HTML iconHTML  

    Significant documents or old scarce books have been saved in digital forms by scanning. However, some noises may occur in a scanned image such as marginal noises. The marginal noises usually appear as dark regions around the margin of the scanned documents. In this paper, we propose a method for removing marginal noise by analyzing image histogram or projection profile of the document image. The m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emotion classification using minimal EEG channels and frequency bands

    Publication Year: 2013 , Page(s): 21 - 24
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1334 KB) |  | HTML iconHTML  

    In this research we propose to use EEG signal to classify two emotions (i.e., positive and negative) elicited by pictures. With power spectrum features, the accuracy rate of SVM classifier is about 85.41%. Considering each pair of channels and different frequency bands, it shows that frontal pairs of channels give a better result than the other area and high frequency bands give a better result th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of enrollment templates count on iris recognition performance using reliable bits

    Publication Year: 2013 , Page(s): 25 - 30
    Request Permissions | Click to expandAbstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    Biometric authentication is among the most convenient, reliable and secure techniques for human identification and recognition. In general, iris-based biometric systems provide very good results in terms of recognition accuracy but, as the noise in input images increases, the performance of these systems starts to fall down. Using multiple templates at enrollment time can be very effective for imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image authentication and recovery using wavelet-based multipurpose watermarking

    Publication Year: 2013 , Page(s): 31 - 36
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (470 KB) |  | HTML iconHTML  

    In this paper, a multipurpose image watermarking method based on the wavelet transform is proposed for content authentication and recovery of the tampered regions. In the proposed method, the original image is first divided into nonoverlapping blocks and each block is transformed into the wavelet domain. The image features are subsequently extracted from the lowest-frequency coefficients of each b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eMenu recommender system using collaborative filtering and Slope One Predictor

    Publication Year: 2013 , Page(s): 37 - 42
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1043 KB) |  | HTML iconHTML  

    The Slope One Predictor is suitable for predicting the online rating-base collaborative filtering which is used for analyzing data related to persons' likes or interests in the menu which are variously diverse and the menus are plenty. The system is considered a Personalized Recommender System by using collaborative filtering of satisfaction that the researchers consider the menu fit for the data.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Text mining wikipedia to discover alternative destinations

    Publication Year: 2013 , Page(s): 43 - 48
    Request Permissions | Click to expandAbstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    This paper discusses an application of some statistical Natural Language Processing algorithms to a set of articles from Wikipedia about top tourist destinations. The objective is to automatically identify the key features of each destination and then discover other destinations which share similar sets of features. Through this a method is demonstrated by which meta data about each article can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Node Based Coincidence algorithm for flow shop scheduling problems

    Publication Year: 2013 , Page(s): 49 - 52
    Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    This work proposes an algorithm called Node Based Coincidence algorithm (NB-COIN) focusing on total flowtime minimization in the permutation flowshop scheduling problems. Many algorithms have been proved to be effective for this problem. However, in the real situation, cost of computation becomes an important factor. NB-COIN produces reasonable solutions using a lot less computation power than oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing modified cuckoo search by using Mantegna Lévy flights and chaotic sequences

    Publication Year: 2013 , Page(s): 53 - 57
    Request Permissions | Click to expandAbstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    In this paper, we present an improvement of the modified cuckoo search (MCS) method. We focus on a new nest generation from the top nest group. This group of nests assists a better local search. We use Tent map chaotic sequences to replace the constant parameter, inverse golden ratio of MCS. This process aims to find a better solution in case of multi-modal problems. The Cauchy Lévy distri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary training of a q-Gaussian radial basis functional-link nets for function approximation

    Publication Year: 2013 , Page(s): 58 - 63
    Request Permissions | Click to expandAbstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    In this paper, radial basis functional-link nets (RBFLNs) based on a q-Gaussian function is proposed. In order to enhance the generalization performance of a modified radial basis function neural network and enhance the performance of the new network, the evolutionary algorithm named real-coded chemical reaction optimization (RCCRO), is presented for training the new network. A developed RCCRO, ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved method to embed larger image in QR code

    Publication Year: 2013 , Page(s): 64 - 69
    Request Permissions | Click to expandAbstract | PDF file iconPDF (997 KB) |  | HTML iconHTML  

    Embedding the owner image is the fundamental concept in identifying the ownership of the QR code. However, the image larger than the percentage of error correction, embedded in the QR code, could not be read. This research try to increase the size of the embedding image by investigating the change of encoding the pad characters and the adjustment of intensity of light. The largest image size that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pruning algorithm for Multi-objective optimization

    Publication Year: 2013 , Page(s): 70 - 75
    Request Permissions | Click to expandAbstract | PDF file iconPDF (987 KB) |  | HTML iconHTML  

    Because of non-existence of an ideal single solution in Multi-objective optimization frameworks, the set of optimal solutions is required to be well spread and uniformly covering wide area of Pareto front. The decision maker (DM) still work hard to compromise the trade-offs solutions based on his/her preferences. In this paper, we proposed a pruning algorithm that can filter out undesired solution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive query suggestion in Thai library automation system

    Publication Year: 2013 , Page(s): 76 - 81
    Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    This paper introduces interactive query expansion for Thai library automation system. The approach aims to expand original Thai-language user queries to a new set of more meaningful queries in the same language. The purpose is to improve the quality of Thai user query and suggest the user with a new set of more meaningful queries. User satisfaction with retrieved results should be improved. The ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contrast enhancement mammograms using denoising in wavelet coefficients

    Publication Year: 2013 , Page(s): 82 - 86
    Request Permissions | Click to expandAbstract | PDF file iconPDF (885 KB) |  | HTML iconHTML  

    Contrast enhancement in x-ray mammograms is important in improvement of radiologists' reading and interpretation. In many cases, it is difficult to discern signs of breast cancer because mammograms are low contrast and very noisy. This paper proposes improved contrast enhancement method in mammograms using denoising in wavelet coefficients. First, mammograms are decomposed by wavelet transform. Se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative effects of using facebook as a learning tool on students' performance

    Publication Year: 2013 , Page(s): 87 - 92
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    This work investigated the effects of using a social media web application to assist learning and teaching in classrooms on learners' performance. We examined Facebook activities of 98 students, consisting of the groups of class of 4/1, 4/3 and 5/1 of Sa school located in Nan province, Thailand, during the first semester of 2011. We applied both statistics and data mining techniques for data analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules

    Publication Year: 2013 , Page(s): 93 - 98
    Request Permissions | Click to expandAbstract | PDF file iconPDF (603 KB) |  | HTML iconHTML  

    Network security is usually protected by a firewall, which checks in-out packets against a set of defined policies or rules. Hence, the overall performance of the firewall generally depends on its rule management. For example, the performance can be decreased when there are firewall rule anomalies. The anomalies may happen when two sets of firewall rules are overlapped or their decision parts are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of the diskless technology

    Publication Year: 2013 , Page(s): 99 - 104
    Request Permissions | Click to expandAbstract | PDF file iconPDF (897 KB) |  | HTML iconHTML  

    Currently, the traditional disk-full technology will be replaced by the diskless technology because of its advantage such as controlling from the Central Control System, managing large number of computer systems, reducing the redundancy of computer system, reducing the energy consumption and costs. However, the disadvantage of diskless technology is slow speed when lot of client machines boot to r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.