Skip to main content
Top

2016 | Book

Genetic and Evolutionary Computing

Proceedings of the Ninth International Conference on Genetic and Evolutionary Computing, August 26-28, 2015, Yangon, Myanmar - Volume II

Editors: Thi Thi Zin, Jerry Chun-Wei Lin, Jeng-Shyang Pan, Pyke Tin, Mitsuhiro Yokota

Publisher: Springer International Publishing

Book Series : Advances in Intelligent Systems and Computing

insite
SEARCH

About this book

This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at ICGEC 2015, the 9th International Conference on Genetic and Evolutionary Computing. The conference this year was technically co-sponsored by Ministry of Science and Technology, Myanmar, University of Computer Studies, Yangon, University of Miyazaki in Japan, Kaohsiung University of Applied Science in Taiwan, Fujian University of Technology in China and VSB-Technical University of Ostrava. ICGEC 2015 is held from 26-28, August, 2015 in Yangon, Myanmar. Yangon, the most multiethnic and cosmopolitan city in Myanmar, is the main gateway to the country. Despite being the commercial capital of Myanmar, Yangon is a city engulfed by its rich history and culture, an integration of ancient traditions and spiritual heritage. The stunning SHWEDAGON Pagoda is the center piece of Yangon city, which itself is famous for the best British colonial era architecture. Of particular interest in many shops of Bogyoke Aung San Market, and of world renown, are Myanmar’s precious stones-rubies, sapphires and jade. At night time, Chinatown comes alive with its pungent aromas and delicious street food. The conference is intended as an international forum for the researchers and professionals in all areas of genetic and evolutionary computing.

Table of Contents

Frontmatter

Data Mining Techniques and Its Applications

Frontmatter
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme

Time-bound hierarchical key assignment (TBHKA) scheme is a cryptographic method. It can assign encryption keys depending on time to a set of security classes in a partially ordered hierarchy. Only the authorized user can compute the encryption key to access the subscribing class (including lower down class) according to the hierarchy. In 2005, Yeh firstly proposed a RSA-based TBHKA scheme supporting discrete time period. However, it had been proved insecure against user colluding attacks. Up to now, there are less study for TBHKA scheme supporting discrete time period. In this paper, we propose a secure and efficient TBHKA scheme. Our scheme is based on pairing-based public key cryptosystem and supports discrete time period. The security analysis is demonstrated that our scheme is secure against outside adversary and malicious user. Finally, we make comparisons between recently proposed two TBHKA schemes and our scheme. It will show the advantages of our scheme.

Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang
Quaternion Principal Component Analysis for Multi-modal Fusion

This paper proposes a multi-modal fusion method that based on quaternion, and principal component analysis (PCA) in quaternion field is involved in our algorithm. We can fuse four different features into quaternion and complete the recognition process in quaternion field. This algorithm reduces the equal error rate (EER) while fusing more kinds of features. Our experiments that fuses three kinds of modalities and four different features with two kinds of modalities respectively show a observably improvement on recognition rate with the proposed algorithm.

Meng Chen, Chenxia Wang, Xiao Meng, Zhifang Wang
A Novel Load Balance Algorithm for Cloud Computing

A good scheduling algorithm is a key for load balance system, in which system’s load meets users’ requirement. Here, a new load balance algorithm based on swarm intelligence is proposed which can enhance the production of the systems while schedule tasks to VMs properly. Here tasks completion time is compared with some other classical algorithms. The result shows that the proposed algorithm could meet users’ requirement and get resource utilization higher. The algorithm is better for network of a large area which is simulated by CloudSim.

Linlin Tang, Jeng-Shyang Pan, Yuanyuan Hu, Pingfei Ren, Yu Tian, Hongnan Zhao
Interference Avoidance Function Research of Spread Spectrum System Using Composite Sequence

Facing with some problems of there being more narrow-band interference than Anti interference tolerance of Communication system in communication channel, such as the serious deterioration of the communication system and the decreased communication quality. We put forward that generating a new mW sequence by composite m sequence and Walsh sequence. When we use mW sequence to change the cycle of m sequence and the line order of Walsh sequence, the position of composite sequence’s power spectrum in frequency band can be changed too. Using this we can avoid narrow-band interference in communication channel, and improve the reliability and efficiency of communication systems. By the MATLAB simulation of using the mW composite sequence as spread spectrum code, using single frequency interference to simulate narrow-band interference, and contrast on its power spectrum and bit error rate, we can illustrate that mW composite sequence can significantly improve the function of communication system.

Bing Zhao, Zuo Li, Fei Xu
An Adaptive Kelly Betting Strategy for Finite Repeated Games

Kelly criterion is the optimal bidding strategy when considering a series of gambles with the wining probability

p

and the odds

$$ b $$

. One of the arguments is Kelly criterion is optimal in theory rather than in practice. In this paper we show the results of using Kelly criterion in a gamble of bidding

T

steps. At the end of

T

steps, there are

$$ W $$

times of winning and

$$ L $$

times of losing. i.e.

$$ T = W + L $$

. Consequently, the best strategy for these bidding steps is using the probability

$$ W/T $$

instead of using

$$ p $$

in Kelly Criterion. However, we do not know the number of

$$ W $$

, to put it better the information of

$$ p $$

, before placing the bet. We first derive the relation of profits between using

p

and

$$ W/T $$

as the winning probability in the Kelly formula, respectively. Then we use the proportion of winning and bidding numbers before time step

t

, denoted as

$$ p_{t} $$

, as the winning probability used in the Kelly criterion at time step

$$ t $$

. Even we do not know the winning probability of

$$ p $$

in a gamble, we can use this method to achieve the profit near the optimal profit when using

$$ p $$

in the Kelly betting.

Mu-En Wu, Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng
A Sanitization Approach of Privacy Preserving Utility Mining

High-Utility Itemset Mining (HUIM) considers both quantity and profit factors to measure whether an item or itemset is a profitable product. With the rapid growth of security considerations, privacy-preserving utility mining (PPUM) has become a critical issue in HUIM. In this paper, an efficient algorithm is proposed to minimize side effects in the sanitization process for hiding sensitive high utility itemsets. Three similarity measurements are also designed as the new standard used in PPUM. Experiments are also conducted to show the performance of the designed algorithm in terms of general side effects in PPDM and the new defined measurements in PPUM.

Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Tzung-Pei Hong, Jeng-Shyang Pan
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments

User authentication is an important technology for E-commerce, especially when it is done by using smart cards. Authentication schemes based on smart cards can guarantee that a user using the smart card is legal and has the authorization to access resources (eg., a bank account or a remote server) behind the smart card. Due to its usefulness, authentication schemes based on smart cards have been widely researched in recent years. In 2014, Choi introduced a security enhanced anonymous multi-server authenticated key agreement scheme using smart card and biometrics. Kuo et. al recently found that Choi’s scheme is insecure against card losing attack and made an improvement to deal with the problem. However, in this paper, we will show that Kuo et. al’s new scheme made the situation even worse. In their new scheme, any server having communicated with and received information from a card of a user can impersonate the user and enjoy the service (eg., on-line shopping) from the server on behalf of the original user without the card on-hand. We conduct a detailed analysis of flaws in their scheme in the hope that no similar mistakes are made in the future. An improved scheme is left as a future work.

Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen
A Modeling Method of Virtual Terrain Environment

Terrain data is the most commonly used data in virtual test. In various applications, terrain data’s type and representation are also different, so we often need to convert terrain data according to the application demand. Aiming at this problem, this paper proposes a new terrain environment modeling method based on SEDRIS (Synthetic Environment Data Representation and Interchange Specification), which we used to represent and exchange the terrain data. Firstly, the form and characteristics of all kinds of terrain data are analyzed, and then the appropriate SEDRIS standard DRM class and the EDCS dictionary are selected to represent the original data, and the STF format terrain environment data with SEDRIS standard is generated. The research of this paper can enhance the normative representation and conversion efficiency of terrain environment data, and realize the terrain data sharing and reuse.

Lian-Lei Lin, Ling-Yu Li, Xin-Yi Song
Method of Founding Focusing Matrix for Two-Dimensional Wideband Signals

The super-resolution direction finding for wideband signals usually requires preliminary direction of arrival(DOA) estimation, whether it is accurate or not will play an important part to the final result. In order to avoid the process, paper proposed a method of founding focusing matrix for two-dimensional wideband signals without preliminary DOA estimation, it is founded on Robust coherent signal subspace method (R-CSSM), the results achieved has a preferable robustness and higher precise than conventional Rotational signal subspace(RSS) method, wherever, there are no special requirements for the array manifold, computer simulations proved the effective performance of the method.

Jiaqi Zhen, Zhifang Wang, Lipeng Gao, Hongyuan Gao, Ruihai Yang

QoS Control and Assessment in Networked Multimedia Applications

Frontmatter
Network Adaptive Flow Control Algorithm for Haptic Data Over the Internet–NAFCAH

This paper deals with the transfer of real time haptic data over the Internet. Some interested transport protocols have already been proposed for the transport of real time haptic data. This paper presents the related work on haptic data transferring. A new network adaptive flow control algorithm is proposed. The new algorithm combines most of the known flow control algorithms while taking into account the network conditions οf the Internet and the significant haptic events.

George Kokkonis, Kostas E. Psannis, Manos Roumeliotis
An Efficient Content Searching Method Using Transmission Records with Wasted Queries Reduction Scheme in Unstructured Peer-to-Peer Networks

A lot of content searching methods applied to Peer-to-Peer (P2P) networks have been researched recently. However, especially in unstructured P2P networks, the amount of traffic grows when a flooding-based content searching is adopted because of a lot of wasted queries. Accordingly, we proposed a content searching method for unstructured P2P networks in our former research, in which each peer keeps query transmission records and guides queries properly so as to reduce wasted ones according to the records by canceling query transmissions to the peers with low content existing probability. In this paper, we improve the proposed method by adding wasted query reduction scheme which works while the usual flooding is executed, and reduce the network traffic without degradation of content acquisition rate. In addition, we discuss the availability of the newly proposed method with its evaluation results given by computer simulations.

Yasuaki Ozawa, Shinji Sugawara
Reliability Specification of Telecommunication Networks Based on the Failure Influence by Using Evolutional Algorithm

For the first step of the reliability design of telecommunication networks, the reliability requirements should be determined. The method to determine the reliability requirements which takes account of the social loss caused by service outage has been established for telephone network in Japan. The feature of above method is to determine the reliability requirement of network element by solving the equation between the loss and reliability of the simple structure of networks, i.e. subscriber areas or transit lines. Therefore, the previous method cannot be applied for the general structure of networks, i.e. the NGN architecture consisted of various control equipment. This paper has investigated the possibility to determine the reliability requirement of network element evolutionally by allocating the traffic demand and the loss caused by failure to the concerned element.

Pingguo Huang, Hitoshi Watanabe
Trade-off Relationship Between Operability and Fairness in Networked Balloon Bursting Game Using Haptic Interface Devices

This paper investigates the trade-off relationship between the operability of haptic interface device and the fairness between players by carrying out subjective and objective QoE (Quality of Experience) assessments in a networked balloon bursting game. In the game, two players burst balloons in a 3D virtual space by using haptic interface devices, and they compete for the number of burst balloons. As a result, we confirm that there exists a trade-off relationship between the operability and fairness; that is, if we try to improve the fairness, the operability is degraded when the network delays are different from terminal to terminal; if we try to improve the operability, the fairness is damaged. We also find that the contribution of the fairness is larger than that of the operability to the comprehensive quality (i.e., the weighted sum of the operability and fairness). Assessment results further show that the output timing of terminals should be adjusted to the terminal which has the slowest output timing to maintain the fairness when the difference in network delay between the terminals is large. In this way, the comprehensive quality at each terminal can also be maintained as high as possible.

Mya Sithu, Yutaka Ishibashi, Pingguo Huang, Norishige Fukushima
The Effect of Spatiotemporal Tradeoff of Picture Patterns on QoE in Multi-View Video and Audio IP Transmission

In this paper, we study QoE (Quality of Experience) of Multi-View Video and Audio (MVV-A) transmission over IP networks. This paper assesses the effect of the tradeoff relationship between improvement of image quality and degradation of viewpoint change response owing to the picture patterns. When the length of GOP (Group of Picture) is short, the viewpoint change response is quick, but the image quality is not good. On the other hand, in the long GOP, the image quality is good owing to high coding efficiency, while the viewpoint change response is slow because the new viewpoint cannot be shown until receiving the next I picture. We employ two contents and assess QoE multidimensionally by a subjective experiment.

Toshiro Nunome, Yusuke Tsuya
Anomalous Behavior Detection in Mobile Network

New security threats emerge against mobile devices as the devices’ computing power and storage capabilities evolve. Preventive mechanisms like authentication, encryption alone are not sufficient to provide adequate security for a system. In this work, we propose User Group Partition Algorithm and Behavior Pattern Matching Algorithm to extract anomalous calls from mobile call detail records effectively. The system accepts the proper input of normal mobile phone call detail records as training dataset and fraud mobile phone call detail records as testing dataset. Two main processes are included in this system: grouping mobile phone calls in training dataset according to similar phone call patterns and matching the new input mobile phone call detail records with grouped mobile phone call patterns to examine the input mobile phone call detail record is normal or not. If the system detects the anomalous mobile phone behavior, the system warns the user that the suspicious mobile phone call is detected and asks the user which action will be taken.

Mon Mon Ko, Mie Mie Su Thwin
Detection of Web Application Attacks with Request Length Module and Regex Pattern Analysis

Web application attack detection is one of the popular research areas during these years. Security for web application is necessary and it will be effective to study and analyze how malicious patterns occur in web server log. This system analyzes web server log file, which includes normal and malicious users’ access patterns with their relevant links. This uses web server log file dataset for the detection of web application attacks. This system intends to analyze normal and attack behaviors from web server log and then classify attack types which are included in the dataset. In this system, three types of attacks are detected namely, SQL injection, XSS and directory traversal attacks. Attack analysis stage is done by request length module and regular expressions for various attack patterns.

Ei Ei Han
A Study on the Effects of Virtualization on Mobile Learning Applications in Private Cloud

Real time communication applications including Mobile learning application can be integrated with other software applications into one platform and deployed in private clouds to reduce capital expenditure and lower overall costs of daily based maintenance and real estate required for computer hardware. As a critical component of private clouds, virtualization may adversely affect a real time communication application running in virtual machines as the layer of virtualization on the physical server adds system overhead and contributes to capacity lose. Virtualization in the mobile can enable hardware to run with less memory and fewer chips, reducing costs and increasing energy efficiency as well. It also helps to address safety and security challenges, and reduces software development and porting costs. This study will investigate how to build an effective learning environment for both the University and learners by integrating the virtualization, private cloud technology and mobile learning applications.

Si Si Mar Win, Hnin Mya Aye, Than New Aung
Developing Mobile Application Framework by Using RESTFul Web Service with JSON Parser

Nowadays, mobile devices offer new ways for users to access information. Web service can be built by using two separate ways: standard SOAP based and RESTFul web service. This paper presents the motivations and technical choices for creating RESTFul API integrated with mobile application. This application framework easy to deploy, test, maintain and rely on scalable and easily integrated infrastructure. And also explain why choose REST rather than SOAP and why choose JSON parser rather than XML.

Ei Ei Thu, Than Nwe Aung

High Speed Computation and Applications in Information Systems

Frontmatter
Subquadratic Space-Complexity Parallel Systolic Multiplier Based on Karatsuba Algorithm and Block Recombination

Recently, high-performance elliptic curve cryptography has gained great attention for resource-constrained applications. In this paper, we use (

a

,

b

)-way Karatsuba algorithm to derive a new way of

k

-way Karatsuba algorithm and block recombination (KABR) approach. We have derived a new parallel systolic multiplication with subquadratic space complexity based on

k

-way KABR approach. By theoretical analysis, it is shown that the proposed structure using

k

-way BRKA has significantly less computation delay, less area-delay product, and less area. Moreover, the proposed structure can provide the desired tradeoff between space and time complexity.

Chiou-Yng Lee, Che Wun Chiou, Jim-Min Lin
Problems on Gaussian Normal Basis Multiplication for Elliptic Curve Cryptosystem

Several standards such as IEEE Standard 1363-2000 and FIPS 186-2 employ Gaussian normal basis (GNB). Gaussian normal basis is a special class of normal basis. Gaussian normal basis can solve the problem that multiplication in normal basis is an very difficult and complicated operation. Two equations have been proposed in the literature to transfer GNB to polynomial basis for easy multiplication. However, we find that GNB is not correctly transformed to polynomial basis for some m values over

$$GF(2^{m})$$

. We will show the problems and expect some feedback about this problem from other researchers.

C. W. Chiou, Y.-S. Sun, C.-M. Lee, Y.-L. Chiu, J.-M. Lin, C.-Y. Lee
Auto-Scaling Mechanism for Cloud Resource Management Based on Client-Side Turnaround Time

Currently, providers of Software as a service (SaaS) can use Infrastructure as a Service (IaaS) to obtain the resources required for serving customers. SaaS providers can save substantially on costs by using resource-management techniques such as auto scaling. However, in most current auto-scaling methods, server-side system information is used for adjusting the amount of resources, which does not allow the overall service performance to be evaluated. In this paper, a novel auto-scaling mechanism is proposed for ensuring the stability of service performance from the client-side of view. In the proposed mechanism, turnaround time monitors are deployed as clients outside the service, and the information collected is used for driving a dynamic auto-scaling operation. A system is also designed to support the proposed auto scaling mechanism. The results of experiments show that using this mechanism, stable service quality can be ensured and, moreover, that a certain amount of quality variation can be handled in order to allow the stability of the service performance to be increased.

Xiao-Long Liu, Shyan-Ming Yuan, Guo-Heng Luo, Hao-Yu Huang
Efficient Digit-Serial Multiplier Employing Karatsuba Algorithm

This paper presents a efficient digit-serial GF(

$$ 2^{m} $$

) multiplier. The proposed architecture using digit-serial of concept to combine the principle of Karatsuba multiplier which can reduce circuit space complexity, also it is suitable for Elliptic Curve Cryptography (ECC) technology. We knows that the password system’s operation core is a multiplier, however that password system’s multiplier is very big, so it is necessary for reduce the area and time’s complexity. This paper is implement three smaller multiplier and digit-serial in FPGA to reduce time and area complexity. This method uses

$$ \frac{3dm}{2} $$

AND gate, 6 m + n+

$$ \frac{3dm}{2} + \frac{m}{2} $$

+d-7 XORs and 3

m

-3 registers. The paper using Altera FPGA Quartus II to simulate four different multipliers, 36 × 36, 84 × 84, 126 × 126 and 204 × 204, and implemented on Cyclone II EP2C70F896C8 experimental platform. The experimental results show that the proposed multipliers have lower time complexity than the existing digit-serial structures. The proposed architecture can reduce the time × space complexity decreasing when the bit-size of multiplier is increasing.

Shyan-Ming Yuan, Chiou-Yng Lee, Chia-Chen Fan
Implementation of an FPGA-Based Vision Localization

The robotic version has been widely used in various industry motion control applications, such as object identification, target tracking or environment monitoring, and etc. This paper focuses on studying the real-time FPGA-based implementation of object tracking for a three axes robot. In this work, a unified FPGA implementation for both object identification and target tracking, including basic image processing, image display and target tracking control, is proposed. In addition, target tracking control method with Sobel filter on edge detection, region of interest and motion control. Experimental results show the effectiveness and versatile application ability of the implementation algorithm in target tracking control. Due the flexibility and speed of FPGA hardware, the generated tracking command can be running in very high precision and very high frequency.

Wen-Yo Lee, Chen Bo-Jhih, Chieh-Tsai Wu, Ching-Long Shih, Ya-Hui Tsai, Yi-Chih Fan, Chiou-Yng Lee, Ti-Hung Chen
Supporting Physical Agents in an Interactive e-book

In recent years, with the advances in information technology and the popularization of computers, obtaining life-around information becomes faster and more convenient. With the emergence of e-books, the reading media is no longer confined to the traditional paper book. People is used to be interactive with lots of interactive media, however most of off-the-shelf e-books offer only data of ordinary flat media, like visual and voice data, and no real touch-interactions there. This study is aimed to use physical agents as interactive media into traditional e-books. Through the performance of the robot body language, users can therefore have profound experience on book context.

Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Jing-Rui Hsiao
A Communication Strategy for Paralleling Grey Wolf Optimizer

In this paper, a communication strategy for the parallelized Grey Wolf Optimizer is proposed for solving numerical optimization problems. In this proposed method, the population wolves are split into several independent groups based on the original structure of the Grey Wolf Optimizer (GWO), and the proposed communication strategy provides the information flow for the wolves to communicate in different groups. Four benchmark functions are used to test the behavior of convergence, the accuracy, and the speed of the proposed method. According to the experimental results, the proposed communicational strategy increases the speed and accuracy of the GWO on finding the best solution is up to 75% and 45% respectively in comparison with original method.

Tien-Szu Pan, Thi-Kien Dao, Trong-The Nguyen, Shu-Chuan Chu
Urban Build-Up Building Change Detection Using Morphology Based on GIS

Rapid urbanization has significant impact on resources and urban environment. In this study, building growth change detection is investigated. To accurate the position of building extraction index, image registration is used that seeks to remove the two-date geometric inconsistent angle with the use of control point selection of latitude and longitude on geographic coordinate system. It is significantly reduce error rates and improve overall accuracy of change detection process. The modified Morphological Building Index (MBI) is applied to extract building features to know how much area has changed. In this system, height information is not considered for building extraction because of without using multispectral band images and Depth. Then, matching-based change rule is applied to obtain changes area of urban region. The experiments show that the proposed method can achieve satisfactory correctness rates with a low level of error rate by comparing with Change Vector Analysis (CVA) method.

Khaing Cho Moe, Myint Myint Sein
Cow Identification by Using Shape Information of Pointed Pattern

Mornitoring cow behavior and performance plays an important role in dairy health and welfare management systems. Due to the increased number of elderly farm workers, the demands for automatic cow monitoring system become a key role. Moreover, the image based technology for a mornitoring system is a promising technique because it is relatively low cost and easy to install. In this aspect, the fundamental and important work to be done is to make an identification of individual cows with high accuracy. Thus in this paper, a simple and effective method for cow identification is introduced by using a modified background subtraction method and histogram based decision process. Specifically, the painted-marks are placed on all black-haired cows and video images are taken. Then the marked region is extracted by using the proposed background subtraction method and histogram based features. Finally, the identification process is performed and some experimental results are shown by using self-collected database taken in the University dairy farm.

Kosuke Sumi, Ikuo Kobayashi, Thi Thi Zin
Perfect Play in Miniature Othello

In 1993, J. Feinstein reported that a perfect play on 6×6 board of Othello gives a 16-20 win for the second player. His result does not remain as a paper, since he reported it on the Newsletter of the British Othello Federation. In our previous paper, we found out a perfect play different from the Feinstein. They have the same score, but it will not be a proof of the Feinstein is a perfect play. In this paper, we confirm that the sequence reported by Feinstein is one of the perfect plays. In addition, we introduce one of perfect plays in each boards of 4×4, 4×6, 4×8 and 4×10. From these results, we discuss the feature of the Othello larger than or equal to 8×8 board.

Yuki Takeshita, Makoto Sakamoto, Takao Ito, Satoshi Ikeda

Circuits and Signal Processing with Engineering Application

Frontmatter
The Development of the Nano-Mist Sprayer and Its Application to Agriculture

In this paper, we describe the development of the nano-mist sprayer using the Venturi effect. This sprayer consists of AC or DC pump for Venturi effect, cylinder for causing Venturi effect, control circuit and separation plate. The particle diameter of this nano-mist sprayer is a few hundred nanometers or less. Furthermore, the particle size can be controlled by air pressure of the pump and shape of the separation plate. This sprayer can be applied to agriculture, medical, health care, etc. In this paper, we show an evaluation result of the mist particle diameter, firstly. Next, in order to confirm the usefulness of the sprayer, we apply to the agricultural field; the repellent spray was done by the fabricated sprayer. The experimental results are reported in this paper.

Shugo Kaminota, Koichi Tanno, Hiroki Tamura, Kiyoto Kawasaki
Low Offset Voltage Instrumentation Amplifier by Using Double Chopper Stabilization Technique

In this paper, we propose a low offset voltage instrumentation amplifier (INA) for biological signal. The proposed circuit consists of the INA and double chopper stabilization circuit for achiving low offset voltage. The proposed circuit was evaluated through HSPICE using 1P 2M 0.6

$$\mu $$

m CMOS process. The offset voltage could be reduced to 4.1[mV] with the power consumption of 75.9[

$$\mu $$

W].

Makoto Sada, Koichi Tanno, Masaya Shimoyama, Zainul Abidin, Hiroki Tamura, Takako Toyama
A Study on Human Interface for Communication Using Electrooculogram Signals

Human interface using eyes for a person with disabilities has been researched. Almost ALS (Amyotrophic Lateral Sclerosis) patient can move facial muscle and eyeball. Therefore, human interface using eyes is the communication tool for a person with disabilities. Human interface is very important when aiming at improvement of quality of life. There are various gaze recognition methods. For example, camera [

1

] and search coil method [

2

] are general techniques. In this paper, we propose a human interface for communication using electrooculogram method by 4 electrodes. From the simulation results, our system has high accuracy of eyes pattern classification.

Kazuya Gondou, Hiroki Tamura, Koichi Tanno
A Study on Indoor Presence Management System Using Smartphone

The aim of this paper is to perform indoor presence management using smartphone. Our proposed method estimates user position and state by smartphone sensors. The position information is estimated by accelerometer and direction sensor. The state information is estimated using gravitational acceleration can be acquired by accelerometer. By using this system, it can estimate human position within 100 cm errors. In addition, this system can estimate the state of subject in 99.2 % accuracy.

Takami Taninoki, Yoshinobu Furukawa, Hiroaki Matsumoto, Hiroki Tamura, Koichi Tanno
A Study on sEMG Pattern Classification Method of Muscles of Respiration

The aim of this paper studies the possibility of new method to diagnose the sleep apnea syndrome. In this paper, we propose analysis method for the pattern classification of breathing from surface electromyogram. First, we measure surface electromyogram that obtained from the surface electrodes attached to crest of neck and mandible muscles. Next, we obtain the peak signal of active from Wavelet transformation of surface electromyogram. We calculate the pattern classification by using the k-nearest neighbor method. From the experimental results, our analysis method was possible to obtain high pattern classification rate when k is 6.

Ryosuke Kokubo, Shogo Okazaki, Misaki Shoitizono, Hiroki Tamura, Koichi Tanno
High Power Wireless Power Transfer Driven by Square Wave Inputs

A power source used in wireless power transfer generates an AC wave to transfer electric power to a load which is not connected electrically but connected electromagnetically to the power source. In this paper, the power and efficiency are compared when a sinusoidal and a square waves which are typical AC waves are applied as power source voltage outputs. The condition under which the two waves respectively transfer equivalent power with electric wires is examined to figure out the effect of different waves. Then the power and efficiency are calculated by a mathematical approach with practical values of elements on various situations. Finally, this paper explores how input waves should be chosen for ideal wireless power transfer.

Kazuya Yamaguchi, Takuya Hirata, Ichijo Hodaka
Analyzing Tagging Accuracy of Part-of-Speech Taggers

Automated part-of-speech (POS) tagging has been a very active research area for many years and is the foundation of natural language processing systems. Natural Language Toolkit (NLTK) library in the Python environment provides the necessary tools for tagging, but doesn’t actually tell us what methods work the best. Therefore, this work analyzes the performance of part-of-speech taggers, namely the NLTK Default tagger, Regex tagger and N-gram taggers (Unigram, Bigram and Trigram) on a particular corpus. The corpora we have used for the analysis are; Brown, Penn Treebank and CoNLL2000. We have applied all taggers to these three corpora, resultantly we have shown that whereas Unigram tagger does the best tagging in all corpora, the combination of taggers does better if it is correctly ordered.

Nyein Pyae Pyae Khin, Than Nwe Aung
Detection of Airway Obstruction from Frequency Distribution Feature of Lung Sounds with Small Power of Abnormal Sounds

We propose a new method to detect airway obstruction from a lung sound record with power of which abnormal sounds is much smaller than power of normal sound s. One of traditional methods to detect airway obstruction is FEV1% (forced expiratory volume 1 sec percentage) using a spirometry. But it bothers a patient too much. Some methods were proposed recently to detect abnormal sounds because an airway obstruction sometimes makes abnormal sounds such as wheeze or rhonchi or else. But it is not available for cases with small power of abnormal sounds. The correlation coefficient between our proposed value and FEV1% was -.592. And the AUC value of the proposed method with 70% threshold of FEV1% was 0.833. The proposed method could detect airway obstruction with sensitivity=0.8 and specificity = 0.78

FEV

1%.

Tomoki Nakano, Shigeyoshi Nakajima
Entropy Based Test Cases Reduction Algorithm for User Session Based Testing

Web applications are crucial role for daily user activities such as online banking, online shopping and searching. It is important to ensure the reliability and web application testing has been used in finding various faults in order to improve the quality of reliable web services. Among test cases generation approaches, user session based testing is an approach to create test cases with real user data. However, real user data usage is extremely large and executing all the test cases can be time consuming in practice. This paper describes the test cases reduction approach for analyzing and replaying the large number of test cases generated from user session data. The entropy gain theory is applied in test cases reduction process to get the best test suite that covers all user accesses of web application. To evaluate the effectiveness of proposed method, the analytical results are described in terms of URLs coverage, reduction time and test cases reduction rate.

Hsu Mon Maung, Kay Thi Win

Text Analysis Technologies and Development Strategies for e-Learning

Frontmatter
Fusion of E-Textbooks, Learning Management Systems, and Social Networking Sites: A Mash-Up Development

Online education has provided good opportunities for educationally disadvantaged people. However, some traditional learning management systems (LMSs), the base systems of online education, had the limitations in offering standardized education for diversified learners with different skills, objectives, abilities, preferences, and backgrounds. In addition, the traditional LMSs, which required a constant connection of the Internet, could not be used where it is not available, that is, in the half of the world. Thus, we developed a new learning platform for large-scale online courses (LSOC), called “the Creative Higher Education with Learning Object (CHiLO)”. CHiLO is a comprehensive, open-network learning system which can realize e-textbooks, competency-based education (CBE), digital badges, and social learning. CHiLO can contribute to future research on next-generation learning content based on e-books and a flexible, diversified learning environment for people worldwide.

Masumi Hori, Seishi Ono, Shinzo Kobayashi, Kazutsuna Yamaji, Toshihiro Kita, Tsuneo Yamada
New Component Technologies and Development Strategies of e-Learning in MOOC and Post-MOOC Eras

Information and Communication Technologies (ICTs) have triggered the innovations of pedagogies and learning methods in all levels of education. In addition to distance education, e-Learning is expected to improve classroom teaching through educational tools and digital content in various blended approaches; Mobile devices and SNS showed the new content distribution and knowledge sharing in learner communities; MOOCs (Massive Open Online Courses) expanded the opportunities of quality education on a global level. This paper discusses the Japanese practices in which MOOCs acted as catalysts implementing component technologies and development strategies for e-Learning.

Tsuneo Yamada
Development and Deployment of the Open Access Repository and Its Application to the Open Educational Recourses

Worldwide activities on open access have triggered many universities to operate institutional repositories (IRs). The National Institute of Informatics (NII) has led a Japanese IR project since 2014 and, developing homegrown repository software named WEKO as a module for the content management system NetCommons (NC). Concepts of WEKO are “High Functionality”, “Easy” and “As you like”. WEKO has almost all functionalities you need as a repository system, and these can be customized and operated by browser. In addition, not only the repository functions but also variety of add-on can be utilized for designing your own web page. More than 250 universities in Japan are now operating WEKO as their IR. Since the WEKO has multilingual functionality, some of the Malaysian university has decided to employ it. In this paper, we summarize the repository related activity in Japan and point out the possible collaboration between open educational and repository.

Kazutsuna Yamaji, Toshihiro Aoyama, Masako Furukawa, Tsuneo Yamada
Challenges of Implementing e-Learning in Developing Countries: A Review

The rapid developments of internet and communication technologies have materially altered many characteristics and concepts of the learning environment. E-learning has started to make way into developing countries and is believed to have huge potential for governments struggling to meet a growing demand for education while facing shortage of expert teachers, shortage of update text books and limited teaching materials. However, there are many challenges to implement e-learning in developing countries such as poor network infrastructure, lack of ICT knowledge, weakness of content development, etc. The objective of this study is to determine the major challenges of implementing e-learning systems in developing countries. The results of this study will serve as a basic for improving higher education in developing countries.

Than Nwe Aung, Soe Soe Khaing
SWOT Analysis of E-Learning Course Operation in Higher Education (Case Study: University of Technology, Yatanarpon Cyber City)

E-Learning is the fast and essential method of delivering educational contents. E-Learning supports one of the alternative ways of traditional teaching and learning. So, most developing countries are initiated e-learning system. This research work aims to provide strengths-weakness- opportunity-threats (SWOT) analysis, the reflection of students and teachers, current infrastructure of e-Learning course operation in higher education in Myanmar. This research is based on online course operation run by three year experiences of ASEAN-Korea Cyber University (ACU) project at the University of Technology (Yatanarpon Cyber City), Myanmar. It discusses the details of project implementation and its capacity to support a new pedagogical framework (‘before’, ‘during’, and ‘after’) course operation at this university. It also concludes with a set of proposed recommendations for the future. Some important issues have been answered and evaluated.

Soe Soe Khaing, Aung Win, Than Nwe Aung
A Sematic Role Labeling Approach in Myanmar Text

There is a generally certainty in the natural language and computational linguistics communities that semantic role labeling (SRL) is an important step toward improving significant applications, e.g. question answering, text summarization and information extraction. We propose a new method for assigning semantic roles on the structured trees of Myanmar sentences using Myanmar Verb Frame (MVF). In this paper, there is not use any machine learning techniques for SRL. It employs with predicate-argument identification algorithm and mapping algorithm to identify semantic roles in Myanmar. These algorithms mainly work on the syntax structure of Myanmar sentences. This system achieves over 70 % success rate in labeling the semantic role of pre-segmented constituents on the datasets.

May Thu Naing, Aye Thida
Text Document Clustering with Ontology Applying Modify Concept Weighting

With the increasing amount of information, researchers in digital communities have witnessed the tremendous growth of publications. The overwhelming amount of information still makes it a time-consuming task. There are many of computer science and medical subject related documents cited on the Internet. Ontologies currently are hot topics in the area of Semantic Web. Ontologies can also help in addressing the problem of searching related entities, including research publications. The purpose of the system is to cluster the text documents based upon the ontology. The system is applying the modified concept weighting and become the extended version of the work that has been done before [8]. After the time passed the testing amount of data becomes lager and the challenges is the time complexity. To overcome this issue the system used the scoring method at the concept weighting stages to manage the time complexity. The experiments reveal that even the testing documents increased; the system may actually be able to produce useful result for text document clustering.

Hmway Hmway Tar, Myint Myint Khaing
Ontology Based Comparative Sentence and Relation Mining for Sentiment Classification

Due to the rapid expansion of the internet, business through e-commerce has become popular. Many products are being sold on the internet and the merchants selling the products ask their customers to write reviews about the products that they have purchased. Opinion mining and sentiment classification are not only technically challenging because of the need for natural language processing, but also very useful in practice. In this study, ontology based compararive sentence and relation mining for sentiment classification in mobile phone (product) reviews are studied. POS taggers are used to tag sentiment words in the input sentences. In this study, Naive Bayes classifier is also used for sentiment classification. Moreover, the comparison between with ontology and without ontology are aiso described. This study is very useful for manufacturers and customers in E-commerce Sites, Review Sites, Blog etc.

Myat Su Wai, May Aye Chan Aung, Than Nwe Aung
Word Boundary Identification for Myanmar Text Using Conditional Random Fields

This paper examines the effectiveness of conditional random fields (CRFs) when used to identify Myanmar word boundaries within a supervised framework. Existing approaches are based on the method of maximum matching which appears to suffer from problems relating to the manner in which Myanmar words are composed. In our experiments, the CRF approach is compared against a baseline based on maximum matching using dictionaries from the Myanmar Language Commission Dictionary (word only) and a manually segmented subset of the BTEC1 corpus. The experimental results show that the CRF model is able to achieve considerably higher F-scores on the segmentation task than the baseline, even when the baseline is allowed to use words from the test data in its dictionary.

Win Pa Pa, Ye Kyaw Thu, Andrew Finch, Eiichiro Sumita
Index Structure for Nearest Neighbors Search with Required Keywords on Spatial Database

There is more and more commercial and research interest in nearest neighbor objects for location-based search from spatial database. Specially, a spatial keyword query takes a user location and user-supplied keywords as arguments and returns objects that is nearest k objects from user current location and textually relevant to the user required keyword. In these systems, user can type one or more word for required keyword. To find the result that contains at least one required keyword, it is important to support Boolean OR semantic keyword search on spatial database. In this paper we study how to answer such queries efficiently for both kNN query and range query. This paper proposes new index structure that combines K-d tree and inverted file. K-d tree efficiently support for both nearest neighbor and range queries. We also discuss Boolean OR Semantic keyword search for the user’s required keywords.

Su Nandar Aung, Myint Myint Sein
Backmatter
Metadata
Title
Genetic and Evolutionary Computing
Editors
Thi Thi Zin
Jerry Chun-Wei Lin
Jeng-Shyang Pan
Pyke Tin
Mitsuhiro Yokota
Copyright Year
2016
Electronic ISBN
978-3-319-23207-2
Print ISBN
978-3-319-23206-5
DOI
https://doi.org/10.1007/978-3-319-23207-2

Premium Partner