The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)

25-28 Jan. 2015

Filter Results

Displaying Results 1 - 25 of 39
  • [Front and back cover]

    Publication Year: 2015, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (927 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2015, Page(s):i - xi
    Request permission for commercial reuse | PDF file iconPDF (342 KB)
    Freely Available from IEEE
  • Recognizing logical parts in Vietnamese legal texts using Conditional Random Fields

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Analyzing the structure of legal sentences in legal document is an important phase to build a knowledge management system in Legal Engineering. This paper proposes a new approach to recognize logical parts in Vietnamese legal documents based on a statistic machine learning method - Conditional Random Fields. Beside linguistic features such as word features, part of speech features, we use semantic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of description logic learning in abnormal behaviour detection in smart homes

    Publication Year: 2015, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    The population age requires assistant systems to assist the elderly to live in a familiar place as long as possible. In the wide range of the smart home applications, abnormal behaviour detection is attracting researchers due to its important benefits for the safety of the elderly people. In this research, a hybrid approach to description logic learning is proposed to learn normal behaviours of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic detection of problematic rules in Vietnamese Treebank

    Publication Year: 2015, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Vietnamese Treebank is a syntactically annotated corpus newly published in 2009. In this paper, we applied automated methods to detect errors in Vietnammese Treebank based on the concept of equivalence classes proposed by Dickinson. On this basis, we propose an improved method of error detection by transforming syntax trees based on vertical markovization. Our experimental results on Vietnamese Tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental analysis of new algorithms for learning ternary classifiers

    Publication Year: 2015, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Discrete linear classifier is a very sparse class of decision model that has proved useful to reduce overfitting in very high dimension learning problems. However, learning discrete linear classifier is known as a difficult problem. It requires finding a discrete linear model minimizing the classification error over a given sample. A ternary classifier is a classifier defined by a pair (w, r) wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving acoustic model for English ASR System using deep neural network

    Publication Year: 2015, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In this paper, a method based on deep learning is applied to improve acoustic model for English Automatic Speech Recognition (ASR) system using two main approaches of deep neural network (Hybrid and bottleneck feature). Deep neural networks systems are able to achieve significant improvements over a number of last year system. The experiments are carried out on the dataset containing speeches on T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking online dictionaries to Wikipedia

    Publication Year: 2015, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1731 KB) | HTML iconHTML

    In a dictionary, a word can have different senses, and each sense is described by a gloss. However, a gloss is short and may not be satisfactorily informative to users. Meanwhile, mostly each word sense has a corresponding article in Wikipedia that contains rich information about the concept expressed by the word sense. In this work, we propose two different methods to link online dictionary word ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new implementation to speed up Genetic Programming

    Publication Year: 2015, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    Genetic Programming (GP) is an evolutionary algorithm inspired by the evolutionary process in biology. Although, GP has successfully applied to various problems, its major weakness lies in the slowness of the evolutionary process. This drawback may limit GP applications particularly in complex problems where the computational time required by GP often grows excessively as the problem complexity in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-based workflow validation

    Publication Year: 2015, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    In order to ensure a workflow to be executed correctly, many approaches were introduced. But not many of them consider the semantic correctness of the workflow in the design time and the run time. In this paper, a solution to check the semantic correctness of the workflow automatically is presented. To do that, the workflow must be represented in a machine understandable form, an ontology-based ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate regret based elicitation in Markov decision process

    Publication Year: 2015, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Consider a decision support system (DSS) designed to find optimal strategies in stochastic environments, on behalf of a user. To perform this computation, the DSS will need a precise model of the environment. Of course, when the environment can be modeled as a Markov decision process (MDP) with numerical rewards (or numerical penalties), the DSS can compute the optimal strategy in polynomial time.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for location promotion on location-based social networks

    Publication Year: 2015, Page(s):53 - 58
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Maximizing the spread of influence was recently studied in several models of social networks. For location-based social networks, it also plays an important role, so a further research about this field is necessary. In this study, based on users' movement histories and their friendships, we first design the Predicting Mobility in the Near Future (PMNF) model to capture human mobility. Human mobili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristics to solve appointment scheduling in chemotherapy

    Publication Year: 2015, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    This paper studies meta-heuristic methods in solving an appointment-scheduling problem in a hospital in Canada. Our paper proposes a two-step algorithm: The first step creates an initial solution with a Greedy Algorithm considering many strategies. The second step consists in choosing the best strategy and improving it with Tabu Search. Our algorithm performed well for the appointment-scheduling p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SentiVoice - a system for querying hotel service reviews via phone

    Publication Year: 2015, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB) | HTML iconHTML

    Sentiment analysis or opinion mining is a new research field but playing an important role in computer sciences, attracting interests of academia as well as industry. As a field of research, it is closely related to natural language processing, machine learning, text mining and information retrieval. In this paper, we use the machine learning approach to classify hotel service reviews. The results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on Image Forgery Detection techniques

    Publication Year: 2015, Page(s):71 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    The paper presents a survey on Image Forgery Detection (IFD) techniques applied for both Copy-Move and spliced images. The survey attempts to cover involved algorithms over past ten years, classify them in groups having the similar methods to solve problems. For the Copy-Move images, the classification depends on differences in processing input images with or without transformation before extracti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying reduplicative words for Vietnamese word segmentation

    Publication Year: 2015, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    This paper proposes a method based on linguistic word-formation rules and dictionaries for determining reduplicative words in Vietnamese. The key idea for identifying whether adjacent syllables in a text can form a reduplicative word based on its formation rules. For 2-syllable reduplicative words, this paper uses rules that describe the repeating and the opposing between pairs of initial consonan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust and high capacity watermarking for image based on DWT-SVD

    Publication Year: 2015, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    In this paper, we propose a blind digital image watermarking technique by combining Discrete Wavelet Transform (DWT) with Singular Value Decomposition (SVD) to improve the robustness and the capacity. In detail, Singular Values (SVs) of watermarks are replaced with the suitable SVs of HH sub-bands of the original images. Additionally, our method generates keys that ensures the security for the wat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key-point matching with post-filter using SIFT and BRIEF in logo spotting

    Publication Year: 2015, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    In this paper, a method to spot and recognize logos based on key-point matching is proposed. It is applied and tested on a document retrieval system. First, the pairs of matched key-points are estimated by the nearest neighbor matching rule based on the two nearest neighbors in SIFT descriptor space with Euclidean distance. Second, a post-filter with BRIEF descriptor space and hamming distance is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Vietnamese 3D taking face for embodied conversational agents

    Publication Year: 2015, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    Conversational agents are receiving significant attention from multi-agent and human computer interaction research societies. Many techniques have been developed to enable these agents to behave in a human-like manner. In order to do so, they are simulated with similar communicative channels as humans. Moreover, they are also simulated with emotion and personality. In this work, we focus on issue ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative evaluation of facial paralysis using tracking method

    Publication Year: 2015, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    Facial paralysis is a common clinical condition with the rate from 20 to 25 patients per 100,000 people per year. An objectively quantitative tool to support for medical diagnostics is very necessary and important. This paper proposes a very simple, visual, and highly efficient method that overcomes the drawbacks of other methods to develop this tool. In our research, we use the tracking of intere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing object quality based on saliency map and derivatives on color distances

    Publication Year: 2015, Page(s):106 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (834 KB) | HTML iconHTML

    In recent years, computers have become more and more important in human life and work. People used computers to control highway, traffic violation, etc. These jobs need process input images to detect interesting objects. This step is important in many computer vision applications such as image segmentation, object recognition, etc. There are a lot of methods to solve this problem. However, most of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some improvements in the RGB-D SLAM system

    Publication Year: 2015, Page(s):112 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1190 KB) | HTML iconHTML

    RGB-D cameras offer both color and depth images of the surrounding environment, making them an attractive option for robot sensor. In this work, we present an RGB-D SLAM system using the Microsoft Kinect. The proposed system is a full 6DoF (Degrees of Freedom) SLAM system which can estimate camera trajectory and reconstruct a 3D model of the environment in real-time. Unlike traditional filtering-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Sort-Tile-Recusive algorithm for R-tree packing in indexing time series

    Publication Year: 2015, Page(s):117 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    The Sort-Tile-Recursive (STR) algorithm is a simple and efficient bulk-loading method for spatial or multidimensional data management using R-tree. In this paper, we put forward an approach to improve the STR algorithm for packing R-trees in indexing time series by some strategies choosing coordinates to partition spatial objects into nodes of R-trees. Every strategy has its own method to connect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain-specific keyphrase extraction and near-duplicate article detection based on ontology

    Publication Year: 2015, Page(s):123 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    The significant increase in number of the online newspapers has given web users a giant information source. The users are really difficult to manage content as well as check the correctness of articles. In this paper, we introduce algorithms of extracting keyphrase and matching signatures for near-duplicate articles detection. Based on ontology, keyphrases of articles are extracted automatically a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying semantic and syntactic relations from text documents

    Publication Year: 2015, Page(s):127 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB) | HTML iconHTML

    Semantic and syntactic relations play an important role of applications in recent years, especially on Semantic Web, Information Retrieval, Information Extraction, and Question Answering. Semantic and syntactic relations content main ideas in the sentences or paragraphs. This paper presents our proposed algorithms for identifying semantic and syntactic relations between objects and their propertie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.