2015 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA)

19-22 Aug. 2015

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (511 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Message from ICAICTA2015 committee

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Program at a glance

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Keynote speaker I: Development of Indonesian natural language processing tools and its usage in text applications

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Table of content

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Equity in distributive justice to virtual characters

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    Behavioral economists and psychologists have investigated what factors affect trade-off between equal allocation and efficient allocation in asset allocation for others (distribution justice). In the present study we performed a behavioral experiment as a basic research of communication in cyberspace to test whether preference of equity or efficiency in asset allocation for virtual characters depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pushing regularity constraint on high utility itemsets mining

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    High utility itemsets mining (HUIM) is an interesting topic in data mining which can be applied in a wide range of applications, for example, on retail marketing-finding sets of sold products giving high profit, low cost, etc. However, HUIM only considers utility values of items/itemsets which may be insufficient to observe buying behavior of customers. To address this issue, we here introduce an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Since the last decade, the growth of computing power and parallel computing has resulted in significant needs of efficient cryptosystem. Elliptic Curve Cryptography (ECC) offers faster computation and stronger security over other asymmetric cryptosystems such as RSA. ECC can be used for several cryptography activities: secret key sharing, message encryption, and digital signature. This paper gives... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The bilateral denoising performance influence of window, spatial and radiometric variance

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1131 KB) | HTML iconHTML

    In the research operation of Digital Signal Processing (DSP) and Digital Image Processing (DIP), one of the most essential obstacles is the image denoise algorithm by the reason of a very large demand of high quality noise-free images therefore there are many image denoise algorithms have been invented in the time of two decades. Bilateral filter is one of the most impressive and feasible algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compilation and evaluation of paraphrase representation list of compound verbs: Toward development of “Control language for action”

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    In order to realize friendly man-machine communication, machines must understand not only surface expressions of human utterance but also deep meanings of human behavior. We started compilation of “paraphrase representation list of compound verbs” as the first step of investigation and standardization of lexical items which is a part of “control language for action”. We processed the corpus and ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a part-time lecturer appointment notification system using UCD

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    This paper describes a part-time lecturer Appointment Notification System for use in the Curriculum and Instruction Development Division Burapha University. We developed software by using a UCD technique. We can reduce the errors in requirements gathering because in every step of the process the user will help us to confirm requirements. This article is presented in 6 parts: part one is the introd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining temporal and content aware features for microblog retrieval

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    Microblog, especially Twitter, have become an integral part of our daily life for searching latest news and events information. Due to short length characteristics of tweets, only content-relevance based search result cannot satisfy user's information need. Recent research shows that considering temporal aspects in this regard improve the retrieval performance significantly. In this paper, we prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TippyDB: Geographically-aware distributed NoSQL Key-Value store

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    The need of scalable databases has raised rapidly in these past few years. Researchers and developers have tried to develop several techniques to create replications and partitions in non-relational databases. However, high latency between distributed data centers has imposed a costly bottleneck to the system's performance. In this paper, we present a system design for nonrelational database - Tip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System development of commercial logo analysis on online social media

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    Social Network Analysis has becoming a new business recently. Many existing systems for social network analysis, however, are still limited to analyzing text. None of them analyzes the content of images that circulate on social media. In this paper we describe our effort in developing a system for analyzing the occurrence of commercial logos (company emblem). A photo-sharing social network is used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatically relation modeling on spatial relationship as self-adaptation ability

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Self-adaptive system is a system that can take proper action automatically to reach its goal, based on the situation which occur at this system environment to meet satisfactory of its users. This paper would illustrate a case about self-adaptation function requirement in application tools that correspond to the requirement of graphic element adjustment function. One of the problems that can arise ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • English to Japanese spoken lecture translation system by using DNN-HMM and phrase-based SMT

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    This paper presents our scheme to translate spoken English lectures into Japanese that consists of an English automatic speech recognition system (ASR) that utilizes a deep neural network (DNN) and an English to Japanese phrase-based statistical machine translation system (SMT). We utilized an existing Wall Street Journal corpus for our acoustic model and adapted it with MIT OpenCourseWare lecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for laptop review analysis

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (718 KB) | HTML iconHTML

    This research paper shows the proposed framework which enables users to know what the review about the laptop is. The objective of this research is to analyze messages from community web sites and identify subjective paragraphs and the sentiment of texts. There are three main procedures of this framework. Firstly, subjective paragraphs will be detected from the source materials by detecting subjec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relation between EMG signal activation and time lags using feature analysis during dynamic contraction

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    This study examined the effects of electromyographic (EMG) signals from Biceps Brachii (BB) muscle on the root mean square (RMS)-time relationships during dynamic contraction. Ten healthy and right hand dominated male subjects were volunteered for the experiments. The RMS features were extracted from the corresponding EMG signals (amplitude of the full wave EMG) for 10 seconds in 5 minutes interva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.