skip to main content
10.1145/3406601acmotherconferencesBook PagePublication PagesiaitConference Proceedingsconference-collections
IAIT '20: Proceedings of the 11th International Conference on Advances in Information Technology
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IAIT2020: The 11th International Conference on Advances in Information Technology Bangkok Thailand July 1 - 3, 2020
ISBN:
978-1-4503-7759-1
Published:
03 July 2020
In-Cooperation:
Microsoft Corporation, NECTEC, KMUTT
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 17 Jan 2025Bibliometrics
research-article
Data Mining Methods for Optimizing Feature Extraction and Model Selection
Article No.: 1, Pages 1–8https://doi.org/10.1145/3406601.3406602

How can we carry out on-the-fly data mining on massive amounts of data, to make relevant predictions, based on data for similar observations to the one currently under consideration? In this paper we show the benefit of using large numbers of ...

research-article
Gamifying MOOC's a Step in The Right Direction?: A Systematic Literature Review
Article No.: 2, Pages 1–10https://doi.org/10.1145/3406601.3406607

Massive Open Online Courses (MOOC) are gaining in popularity in recent years. However, there are certain well-known drawbacks of MOOCs like lack of student motivation, student engagement, and high dropout rates, which cast doubt on the success of MOOCs. ...

research-article
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems
Article No.: 3, Pages 1–7https://doi.org/10.1145/3406601.3406608

An intrusion detection system monitors and analyzes all the incoming packets, on a given network, to detect any corresponding vulnerabilities and intrusions. It consists of four major modules: packet capturing, packet decoding, packet preprocessing and ...

research-article
Robust LCSS Beamformer against DOA Mismatch
Article No.: 4, Pages 1–7https://doi.org/10.1145/3406601.3406609

To cancel interference signals that have fluctuated orientation of directions, the LCSS (Linear Constrained Sector Suppressed) approach is a null broadening beamforming based on the correlation matrix of the steering vectors on the predefined sector of ...

research-article
User Behavior Analytics for Anomaly Detection Using LSTM Autoencoder - Insider Threat Detection
Article No.: 5, Pages 1–9https://doi.org/10.1145/3406601.3406610

Identifying anomalies from log data for insider threat detection is practically a very challenging task for security analysts. User behavior modeling is very important for the identification of these anomalies. This paper presents unsupervised user ...

research-article
Automated Scheduling of Undergraduate Student Advising Reservation using Extended Flower Pollination Algorithm
Article No.: 6, Pages 1–9https://doi.org/10.1145/3406601.3406611

Academic advising is an important process to assist undergraduate students in their academic life because it provides students the direction about personal, social, and educational concerns. However, the traditional process that an advisor manually ...

research-article
Enhancement of Fault Tolerance in Kafka Pipeline Architecture
Article No.: 7, Pages 1–8https://doi.org/10.1145/3406601.3406612

Fault tolerance act as the most important factor to improve the reliability of the real-time messaging system. Checkpointing and replication are the main factors to promote the performance of fault tolerance. The paper emphasizes the message recovery ...

research-article
A System to Estimate the Amount and Calories of Food that Elderly People in the Hospital Consume
Article No.: 8, Pages 1–7https://doi.org/10.1145/3406601.3406613

Malnutrition in the elderly is an important issue, especially for the elderly in hospitals. In general, nutritionists calculate energy from foods that the elderly need each day. If the elderly eat less food and do not receive enough energy, ...

research-article
AcaChain: Academic Credential Attestation System using Blockchain
Article No.: 9, Pages 1–8https://doi.org/10.1145/3406601.3406614

Blockchain has been a part of people's interest in the development of various areas such as digital currencies (e.g., Bitcoin), securities, healthcare, record-keeping and much more. Some of the key features of blockchain technology are immutability, ...

research-article
ThaiFlick: Flicked Keyboard on Mobile Devices for Thai using Phoneme Matching
Article No.: 10, Pages 1–8https://doi.org/10.1145/3406601.3406615

Composing messages with virtual keyboard is a challenging task especially for Thai messages. There are too many Thai characters to fit a mobile keyboard. Moreover, screens of smartphones are so small that those having big fingers frequently tap on ...

research-article
Reversible Data Hiding Using Multi-Layer Perceptron Based Pixel Prediction
Article No.: 11, Pages 1–8https://doi.org/10.1145/3406601.3406616

Reversible data hiding is a branch of data hiding in which cover image can additionally be restored along with the extraction of hidden data. In prediction error expansion based reversible data hiding techniques, pixel values are predicted using the ...

research-article
ARMA Model for Revenue Prediction
Article No.: 12, Pages 1–6https://doi.org/10.1145/3406601.3406617

For every country in over the world, tax revenues appear to be the main engines contributing to the growth momentum. The prediction of tax revenues is one of the main challenges of the Myanmar Internal Revenue Department. It is not easy to get an ...

research-article
A data augmentation technique based on text for Vietnamese sentiment analysis
Article No.: 13, Pages 1–5https://doi.org/10.1145/3406601.3406618

Online opinions are used as a data source that contains relevant information about customer sentiments toward a product or service. This can be used to make a specific decision for customers and management. In order to achieve the good models for ...

research-article
Comparative Performance of Various Deep Learning based Models in Fruit Image Classification
Article No.: 14, Pages 1–9https://doi.org/10.1145/3406601.3406619

Fruit type classification based on computer vision remains challenging because of shape, color and texture similarity among numerous species of fruits. Recent research results indicate that the Convolutional Neural Network based models have demonstrated ...

research-article
Privacy Protection in Smart Health
Article No.: 15, Pages 1–8https://doi.org/10.1145/3406601.3406620

Smart health exploits smart health devices (e.g., fitness trackers, heart rate or glucose monitoring units) and Internet of Things technologies to improve users' health and wellness. By enabling self-monitoring and data sharing among users and ...

research-article
Visual Features for Multivariate Time Series
Article No.: 16, Pages 1–8https://doi.org/10.1145/3406601.3406621

Visual analytics combines the capabilities of computers and humans to explore the insight of data. It provides coupling interactive visual representations with underlying analytical processes (e.g., visual feature extraction) so that users can utilize ...

research-article
Articulated Trajectory Mapping Using Mobile Environments for Location-Based Learning
Article No.: 17, Pages 1–6https://doi.org/10.1145/3406601.3406622

This paper addresses how to enhance post-tour activities with digital mobile devices. Walkers sometimes use GPS loggers to record, review, and share their walking stories. However, the raw trajectory data recorded can be difficult to browse through on a ...

research-article
Predicting Application Performance in LoRa IoT Networks
Article No.: 18, Pages 1–7https://doi.org/10.1145/3406601.3406623

Network planning is critical to satisfactory application performance and efficient network resource utilization especially in an outdoor IoT network such as LoRa. As IoT devices may locate at different distances from the gateway and use different ...

Article
Using LSTM for Context Based Approach of Sarcasm Detection in Twitter
Article No.: 19, Pages 1–7https://doi.org/10.1145/3406601.3406624

In this research, we propose a sarcasm detection by taking into consideration its many varying contexts, related to the word or phrase in a tweet. To get the related context, we extract the information with paragraph2vec to simplify the process of ...

research-article
The Impact of Data Imputation and Feature Extraction on PM2.5 Forecasting Performance in Bangkok Using Long Short-Term Memory Neural Networks
Article No.: 20, Pages 1–10https://doi.org/10.1145/3406601.3406625

The last few years have seen a dramatic increase in PM2.5 air pollution in Thailand's major cities. Various works have tried to develop efficient Long Short-Term Memory (LSTM) deep neural network models for PM2.5 concentration forecasting. However, ...

research-article
Network Anomaly Detection using Threshold-based Sparse
Article No.: 21, Pages 1–8https://doi.org/10.1145/3406601.3406626

Nowadays, cyber-attacks have been dramatically increased due to the rapid development of Internet-based services. The current network anomaly detection solutions such as Firewall, Snort, honeypots are useful, but they are insufficient to deal with zero-...

research-article
A Data Masking Guideline for Optimizing Insights and Privacy Under GDPR Compliance
Article No.: 22, Pages 1–9https://doi.org/10.1145/3406601.3406627

The General Data Protection Regulation (GDPR) has been enforced since May 2019 and became a disruptive issue to every organization due to its severe penalties in the data breaches or use of personal data for illegal purposes, e.g., lack of the consent ...

research-article
Health Data Analytics with an Opportunistic Big Data Algorithm
Article No.: 23, Pages 1–9https://doi.org/10.1145/3406601.3406628

In data-driven society, health data can lead to profound impacts on public safety policies, epidemic modeling, and advancement of health science and medicine. This paper presents an approach to automatically elucidating useful information from "Big" ...

research-article
Provenance Location-based Authentication in Cloud Computing
Article No.: 24, Pages 1–8https://doi.org/10.1145/3406601.3406629

Cloud computing will continue flourishing. Like any technology that is widely used and advancing with many benefits, it also comes with issues, some of which are unavoidable. Security is one of the major concerns for cloud computing. To protect user ...

research-article
Digital Rock Core Image Super-Resolution via Deep Convolutional Neural Networks
Article No.: 25, Pages 1–10https://doi.org/10.1145/3406601.3406630

Digital Rock is a research hotspot in the field of oil and gas. In practice, oil and gas departments hope to get clearer images of rock core which are helpful for them to understand characteristics of reservoir rock better. And based on that they can ...

research-article
Social Engineering Intrusion: A Case Study
Article No.: 26, Pages 1–5https://doi.org/10.1145/3406601.3406631

Social engineering is a very old method to influence people in their daily actions. The same methods added with new techniques have been implemented to create effective penetration mechanisms against organizations. The goal in this study was to measure ...

research-article
Online Learning During COVID-19: Students' Perception of Multimedia Quality
Article No.: 27, Pages 1–6https://doi.org/10.1145/3406601.3406632

The COVID-19 pandemic has forced educational institutes worldwide to resort to an "online only" mode of teaching delivery. As a consequence, throughout the globe there has been an increasing trend among the students to use different videoconferencing ...

research-article
Paying by Your Messaging Application?: A Trust Model
Article No.: 28, Pages 1–10https://doi.org/10.1145/3406601.3406633

User adoption of mobile payments is low when compared to the traditional payment methods. At the same time, there has been a surge in the usage of second-generation mobile instant messaging (SMIM) services. Integrating these two services can be a game ...

research-article
A 3D-CNN Siamese Network for Motion Gesture Sign Language Alphabets Recognition
Article No.: 29, Pages 1–6https://doi.org/10.1145/3406601.3406634

Sign language recognition is developed for assisting hearing- and speech-impaired people who communicate with others by using hand gestures as a nonverbal communication. The system aims to translate still images or video frames of sign gestures to a ...

research-article
Hybrid Classroom: Designing for the New Normal after COVID-19 Pandemic
Article No.: 30, Pages 1–8https://doi.org/10.1145/3406601.3406635

In the end of December 2019, there was a reported of novel coronavirus in Wuhan, China. Later, this virus named COVID-19 became one of a major outbreak of the world. Since the virus can be spread through the air, the social distancing is essential. Many ...

Contributors
  • University of Toronto
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 20 of 47 submissions, 43%
YearSubmittedAcceptedRate
IAIT '18472043%
Overall472043%