2018 International Conference on Intelligent Information Technology (ICIIT 2018) is sponsored by Hong Kong Chemical, Biological & Environmental Engineering Society (CBEES) and Biology and Bioinformatics (BBS), and co-sponsored by Institute of Biotechnology (IBT), Vietnam Academy of Science and Technology. ICIIT provides a scientific platform for both local and international scientists, engineers and technologists who work in all aspects of Intelligent Information Technology. In addition to the contributed papers, Prof. Francis Y. L. Chin from Hang Seng Management College and Emeritus Professor, University of Hong Kong, Hong Kong, Prof. Akinori Ito from Tohoku University, Japan, Assoc. Prof. Norma Binti Alias from Universiti Teknologi Malaysia, Malaysia internationally known experts from several countries are also invited to deliver keynote, plenary and invited speeches at ICIIT 2018.
Proceeding Downloads
A Robust Liver Segmentation in CT-images Using 3D Level-Set Developed with the Edge and the Region Information
CT-images have been used widely in hospitals around the world. The segmentation of liver from CT-images is important, because it can help medical doctors to have a clear view of the liver with rendering tools. The segmentation's result is also useful ...
Human Emotion Classification from Brain EEG Signal Using Multimodal Approach of Classifier
To deeply understand the brain response under different emotional states can fundamentally advance the computational models for emotion recognition. Various psychophysiology studies have demonstrated the correlations between human emotions and EEG ...
Myanmar Continuous Speech Recognition System Using Fuzzy Logic Classification in Speech Segmentation
Speech recognition is one of the next generation technologies for human-computer interaction. Automatic Speech Recognition (ASR) is a technology that allows a computer to recognize the words spoken by a person through telephone, microphone or other ...
Fast Hemorrhage Detection in Brain CT Scan Slices Using Projection Profile Based Decision Tree
Detection of a hemorrhage in CT scan slices is one of the crucial steps for a neurosurgeon to diagnose any abnormality and severity in the brain of a patient. It is usually time consuming as there are as many as 256 produced slices from a CT scan ...
Pose VariantFace Recognition Based on Linear Mapping
Under uncontrolled image conditions, one of the greatest remaining research challenges in face recognition is to recognize faces across different poses. For multi-views face recognition problem either by means of difficult practical three-dimensional ...
OD Localization Using Rotational 2D Vessel Projection with Decision Tree Classification
Automatic Optic Disc (OD) localization is an important problem in ophthalmic image processing. Knowing its location helps doctors with the early detection of preventable eye diseases. Inspired by a fast and accurate OD localization algorithm utilizing ...
Towards a Biographic Knowledge-based Story Ontology System
In this article, we illustrate some of the semantic web-related technologies and design a set of ontology knowledge structures based on biographical history, using the OWL markup language, which we call BKOnto. This is an official framework for ...
Simulation Wireless Sensor Networks in Castalia
Wide application usage of Wireless Sensor Network (WSN) triggers many developments in this area. Properly selecting network simulator plays an important role for developing WSN routing protocol and MAC protocol since its different performance focuses. ...
Spoken Term Detection of Zero-Resource Language using Machine Learning
In this paper, we propose a spoken term detection method for detection of terms in zero-resource languages. The proposed method uses the classifier (the speech comparator) trained by a machine learning method combined with the dynamic time warping ...
An OSGi Monitoring System to Support Dynamicity and to Enhance Fault Tolerance of OSGi Systems
This work addresses the problem of monitoring stateful services on a dynamic service-oriented architecture (SOA), such as OSGi. Indeed, in such architecture, services may disappear and appear, and if a used service disappears, then the client doesn't ...
OpF-STM: Optimized Persistent Overhead Fail-safety Software Transactional Memory in Non-volatile Memory
Non-volatile memory is emerged such as PCM and 3D XPoint. With the advent of Non-volatile memory, Software platforms have also been developed to manage Non-volatile memory areas. Recently those platforms support PTM system(Persistent transactional ...
An Overview of Techniques for Confirming Big Data Property Rights
The major premise of big data circulation is to identify the ownership of data resource. This paper summed some feasible techniques and methods for confirming big data property which are data citation technology, data provenance technology, data ...
Prediction of the Fourth Industrial Revolution Based on Time Series
The history of human industrial development has undergone three industrial revolutions. Based on the occurrence time sequences of the three industrial revolutions, the industrial revolution time prediction function based on quadratic function and the ...
Index Terms
- Proceedings of the 2018 International Conference on Intelligent Information Technology