There are 41 submitted papers and only 24 papers have been included in this volume. A lot of our participants are from all over the world, such as China, Jordan, Indonesia, Japan, Pakistan, Thailand, Malaysia, India, etc.
Proceeding Downloads
A Systematic Literature Review on Combining Ontology with Bayesian Network to Support Logical and Probabilistic Reasoning
Reasoning in ontology is currently limited to logical reasoning. It is because ontology does not have a standard for probabilistic reasoning. Various approaches have been made by researchers to add the ability for ontological reasoner to do ...
Real-time Analysis and Visualization for Big Data of Energy Consumption
This paper proposes a research on real-time analysis and visualization for big data of energy consumption. In this research, we access real-time energy consumption data from cloud storage by a Transmission Control Protocol/Internet Protocol (TCP/IP). In ...
Combining Word Order and CNN-LSTM for Sentence Sentiment Classification
Neural network models have been demonstrated to be capable of achieving state-of-the-art performance in sentence sentiment classification. Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are two widely used neural network ...
Emotion Classification of Duterte Administration Tweets Using Hybrid Approach
Nowadays, people engage in social networking sites to gain information, share thoughts and ideas, and give reaction to certain topics. The works of Duterte Administration has been a hot topic in the country since the day it started its term. This ...
A Comparative Study: Different Automatic Approaches of Stars Generation for Reviews
A majority of blogs and websites utilize the five-star rating system with one being the lowest and five being the highest in rating the quality of experience or service in tourist spots. Customers leave reviews and suggestions in an effort to create an ...
Tree Structure for Expressive MapReduce Framework
The traditional MapReduce paradigm lacks in expressivity. However it is popular for its fault-tolerance, automatic parallelism, and the ease of distributed computing. Our work aims to tackle this by introducing an expressive MapReduce framework. ...
Mobile Travel Apps' Adoption: Integrating Perceived Characteristics of Innovation and Software Quality
The growing popularity of smartphone has changed the way of service operations and delivery in the travel and tourism industry. Mobile applications for travel information and activities in recent years proliferate rapidly and now have actually become a ...
A Comprehensive Investigation of Model Driven Architecture (MDA) for Reverse Engineering
Models and transformations are the primary elements of Model Driven Architecture (MDA). On the other hand, Reverse Engineering (RE) also deals with the intermediate models and different transformation practices to produce the desired output models. ...
Aspect-Oriented Approach for Supporting House Bookkeeping Software Design
Aspect-Oriented Approach is mainly applied for supporting software design in many software applications. The separation of concerns is the most significant purpose to handle with flexible requirements. In this paper, we have designed a fine granularity ...
Empirical Study on Software Bug Prediction
Software defect prediction is a vital research direction in software engineering field. Software defect prediction predicts whether software errors are present in the software by using machine learning analysis on software metrics. It can help software ...
A Feature-oriented Domain Design Approach to FX Derivatives Trading System
With the continuous development of inter-bank FX (foreign exchange) market, FX trading platform has been developed from a single electronic trading platform to multiple electronic trading platforms which covered a variety of trading products and trading ...
The Rise of Ransomware
Ransomware continues to be one of the most crucial cyber threats and is actively threatening IT users around the world. In recent years, it has become a phenomenon and traumatic threat to individuals, governments and organizations. Ransomwares not only ...
Evaluating Usability for Mobile Application: A MAUEM Approach
Many traditional usability metrics were purposely created for desktop computer applications and may not be directly applicable to mobile device applications. Usability metrics refer as means of measuring or evaluating the usability factors, attributes ...
The Effect of Sizes of the Feature Sets on Intrusion Detection Performances
Adaptive Intrusion Detection System (IDS) is a class of IDS that uses observed flows behaviors to detect malicious activities -- usually with the aids of machine learning techniques. Most researches in this field focus on which features to be used or ...
Beyond Cybersecurity Awareness: Antecedents and Satisfaction
Organizations develop technical and procedural measures to protect information systems. Relying only on technical based security solutions is not enough. Organizations must consider technical security solutions along with social, human, and ...
Online community support for the marketing of cosmetic medicine
The rise of the cosmetic medicine industry and the popularization of the Internet have inevitably led to a degree of intersection between the two, including a broad range of messaging and future applications. This study evaluated whether the effects of ...
Research on Potential Damage Estimation of Household Appliances Based on gcForest Model
Safety accidents of household electrical appliances have been emerging in recent years, which made some scholars begin to study from the safety of industrial electrical appliances to household electrical appliances. In view of the small sample data, ...
Usability test method for embedded systems Considering with visually impaired
Along with the advancement of the system, the user base has also been expanding. The usability of a Graphical User Interface (GUI), especially for people with poor vision, is of paramount importance. Therefore, a usability test which takes such users ...
A Comparison of Teachers' Supportive Behaviour in Middle High School Classroom in Taiwan, Shanghai-China, and Finland: Evidence from PISA 2012
When evaluating the students' learning process, the previous mathematics curriculum in Taiwan valued rarely the role of inquiry and formative assessment. As an effort to understand the impact of this movement, the purpose with this study is to evaluate ...
Targeting Algorithm Based on ITSM
In this paper, the tactical significance map (TSM) is introduced at first, and then a novel prioritizing method based on improved TSM (ITSM) is proposed. a prioritizing model based on multi-attribute linear weighting is established; and then, through ...
Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET
Vehicular Ad-Hoc Network (VANET) is a form of Peer-to-Peer (P2P) wireless communication between vehicles, which is characterized by the high mobility. In practice, VANET can be utilized to cater connections via multi-hop communication between vehicles ...
A Research on Modern Commercial Circulation Development Strategies in the Context of New-type Urbanization: A Case Study of Zhejiang Province
In order to adapt to the changes of macro-economic situation home and abroad, China needs to take the path of new-type urbanization. New-type urbanization should be consumer-driven. As a "forerunner industry" of the basic industries of the national ...
Bank Lines of Credit Will Be the Supplement to Cash in Corporate Liqudity Management
In this article, we will discuss whether lines of credit can be a supplement to cash as a source of liquidity for firms to make a choice. When firms want to raise funds from market, a credit line or cash will be both agreeable choice, if the world is ...
A bibliometric analysis of two decades of research on business models
Owing to the huge volume of literature on business models, this study investigates the primary conceptual categories of research on this topic. It attempts to identify major research trends about business models through a systematic categorization of ...
Index Terms
- Proceedings of the 2017 International Conference on Software and e-Business