skip to main content
10.1145/3628454acmotherconferencesBook PagePublication PagesiaitConference Proceedingsconference-collections
IAIT '23: Proceedings of the 13th International Conference on Advances in Information Technology
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IAIT 2023: 13th International Conference on Advances in Information Technology Bangkok Thailand December 6 - 9, 2023
ISBN:
979-8-4007-0849-7
Published:
06 December 2023

Bibliometrics
research-article
Hardware Performance Analysis of N-bit CLA on FPGA and Programmable SoC

Carry Look Ahead Adders (CLA) minimize duration opposed with various adders through transmitting carry preceding the total output, which leads to better results. They increase efficiency by lowering the duration it takes to figure out carry bits. In ...

research-article
Enhancing Novelty in ChatGPT Responses: Incorporating Random Word Brainstorming

This paper presents a new prompting approach for increasing the novelty in ChatGPT responses. ChatGPT has proven to be effective in generating natural language responses; however, ensuring response novelty remains challenging. Our proposed method, ...

research-article
Open Access
Exploring the Potential of ChatGPT as a Dungeon Master in Dungeons & Dragons tabletop game

The emergence of advanced AI language models has opened up new possibilities for the integration of artificial intelligence in various domains, including tabletop role-playing games. This research explores the potential of ChatGPT, a widely-used large ...

research-article
Scenario Fidelity and Perceived Driver Mental Workload: Can Workload Assessment be Crowdsourced?

Driver workload assessment is difficult. In spite of decades of effort, there is still no generally accepted method of assessing driver mental workload. Prominent methods include physiological, subjective, and dual-task assessments. While driving ...

research-article
Open Access
Spam Article Detection on Social Media Platform Using Deep Learning: Enhancing Content Integrity and User Experience

In the digital age, the widespread use of online social media corresponds with a rise in spam. These messages often appear as forceful ads, sales offer, gambling promotions, or repetitive chain messages, and they compromise users' experiences and the ...

research-article
A Data-Driven Approach to Detect Dehydration in Afghan Children Using Deep Learning

Child dehydration is a significant health concern, especially among children under 5 years of age, as they are more susceptible to conditions such as diarrhea and vomiting. In Afghanistan, the impact of severe diarrhea on child mortality is exacerbated ...

research-article
Open Access
Formulating Analytical Governance Frameworks: An Integration of Data and AI Governance Approaches

This study underscores the importance of standard data analytics governance within organizations to leverage the potential of increasing volumes of big data. Even though Thailand has operative frameworks for data governance and AI governance, there lacks ...

research-article
Impact of External Factors on Air Passenger Demand Prediction Using Machine Learning

The aviation industry has seen considerable changes in recent years, with multiple underlying factors influencing passenger demand. This research delves into these external factors impacting air travel demand in Thailand. By merging historical arrival ...

research-article
Validation of Candlestick Patterns as a Technical Indicator for Commodity Traders, Proposal of Improved Candlestick Encoding, and Data Mining Improved Candlestick Patterns

Traders in financial markets utilize many different technical indicators. One of the most widely used technical indicators in trading is the candlestick pattern, which is the graphical representation of the price movement of a pre-determined time period. ...

research-article
research-article
Open Access
Exploring User Experience with Voice Assistants: Impact of Prior Experience on Voice Assistants

Voice assistants (VA) like Siri, Alexa, Cortana, and Google Assistant are on the rise, and are currently integrated into smartphones, and dedicated home speakers. They handle various tasks through voice commands, from home automation, emails to ...

research-article
Open Access
Article Feed Recommendation System for Thai Social Media Application Using Article Context Based on Deep Learning

In recent years, social media applications have exhibited significant growth in the number of users. Enhancing content alignment with user preferences is essential in developing a sophisticated recommendation system. Neural networks have become pivotal ...

research-article
Enhancing Cybersecurity Resilience: A Comprehensive Analysis of Human Factors and Security Practices Aligned with the NIST Cybersecurity Framework
Article No.: 13, pp 1–16https://doi.org/10.1145/3628454.3629472

Although effective technical countermeasures play a pivotal role in safeguarding organizations’ digital assets, the persistent challenge of human factors in cybersecurity cannot be underestimated. This study aims to identify the human factors employed ...

research-article
Am I Fighting Well? Fighting Game Commentary Generation With ChatGPT

This paper presents a new approach for leveraging ChatGPT in fighting game commentary generation task. Commentary generation often relies on deep learning techniques, which typically demand extensive data to achieve effectiveness. Large language models (...

research-article
University Students’ Acceptance and Usage of Generative AI (ChatGPT) from a Psycho-Technical Perspective

The emergence of ChatGPT as a generative AI tool has revolutionized the educational scenario by bringing in unprecedented changes. In this respect exploring the factors that affect the adoption and acceptance of ChatGPT services for educational purpose ...

research-article
Designing a vulnerability threat detection scanner with the use of machine learning models

Vulnerabilities are a serious threat to operational systems, networks, and applications. Identifying them in web services is crucial for organizations aiming to safeguard their intellectual property and data. This process involves automated scans to ...

research-article
Open Access
Unlocking the Black Box: Exploring the use of Generative AI (ChatGPT) in Information Systems Research

With the gaining popularity of generative AI tools like ChatGPT and their usage across several domains and disciplines, the question that naturally arises is how it can help the Information Systems (IS) researchers? Measuring hidden or latent constructs ...

research-article
Framework for Choosing a Supervised Machine Learning Method for Classification Based on Object Categories : Classifying Subjectivity of Online Comments by Product Categories

The core objective of this research is to develop a methodology for selecting a supervised machine learning classification technique based on the specific categories of objects that need to be classified. The study focuses on product categories extracted ...

research-article
Open Access
Khmer Calligraphy Style Transfer Using SkelGAN

Font style transfer is a challenging task in computer vision, aimed at extracting the visual characteristics such as stroke contrast and apply them to the content image. In this article, we focus on utilizing SkelGAN, a modified version of the U-Net ...

research-article
Open Access
Digital Space Economic Transformation Design: An Innovation Ecosystem Approach
Article No.: 20, pp 1–10https://doi.org/10.1145/3628454.3630589

Economic development is fueled by technological innovation. The digital space economic transformation is expected to be the new economic strategy for Thailand, involving integrating the value chain of the digital and space technology domains. This ...

research-article
Segment-based and Patient-based Segmentation of CTPA Image in Pulmonary Embolism using CBAM ResU-Net

An accurate pulmonary embolism segmentation from computed tomography pulmonary angiography (CTPA) images is very important in pulmonary embolism diagnosis. However, the segmentation process nowadays is done manually by physicians, making the process time-...

research-article
Predicting Blood Drop Height and Volume using Physics Equations, VGG-19, and XGBoost

Blood Pattern Analysis is a technique in forensic science that focuses on leftover bloodstains from the crime to recreate the event. However, the fluctuation in air resistance and drop deformity causes the calculations to deviate from the exact values. ...

research-article
Power and Delay Efficient Hardware Implementation with ATPG for Vedic Multiplier Using Urdhva Tiryagbhyam Sutra

In most implementations of digital circuitry, multiplication requires the highest latency and computational complexity. Vedic calculations are an ancient system of mathematics that involves mathematical computations to ascertain the multiplication in ...

research-article
SpreadQuery: A User-Friendly Database Query System Utilizing Spreadsheet Software

In the context of digital transformation, effective decision-making is paramount for corporate adaptability and growth. Spreadsheet software provides a familiar platform for accessing, analyzing, and visualizing data. In many instances, decision-making ...

research-article
Code-Mixing Strategies for Computer Mediated Communication with Non-Native Speakers

Code-mixing, the practice of seamlessly blending multiple languages or language varieties in communication, is a common linguistic phenomenon among bilingual and multilingual individuals. However, applying code-mixing when communicating with monolingual ...

research-article
A Modified Snake Optimizer Algorithm with Otsu-based Method for Satellite Image Segmentation

Image segmentation is an important step in image analysis that aims to segment regions of interest in an image by assigning a label to individual pixels sharing certain characteristics. Otsu-based method is a well-known thresholding technique that ...

research-article
ClusteredSHAP: Faster GradientExplainer based on K-means Clustering and Selections of Gradients in Explaining 12-Lead ECG Classification Model

The vast majority of healthcare systems are operating at or near their full capacity. Providing an inaccurate diagnosis is a further prevalent issue. Although it is common knowledge that physicians get significant training, it is nevertheless possible ...

research-article
Open Access
Impact of Different Discrete Sampling Strategies on Fitness Landscape Analysis Based on Histograms

Complex problems are frequently tackled using techniques from the realm of computational intelligence and metaheuristic algorithms. Selection of a metaheuristic from the wide range of algorithms possessing various properties to address specific problem ...

research-article
Open Access
Randomization of Low-discrepancy Sampling Designs by Cranley-Patterson Rotation

Complex problems are often addressed by methods from the domain of computational intelligence, including metaheuristic algorithms. Different metaheuristics have different abilities to solve specific types of problems and the selection of suitable ...

research-article
Open Access
Freezing of Gait Prediction Using Deep Learning

Freezing of gait is a Parkinson's Disease symptom that episodically inflicts a patient with the inability to step or turn while walking. While medical experts have discovered various triggers and alleviating actions for freezing of gait, the underlying ...

Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate20of47submissions,43%
YearSubmittedAcceptedRate
IAIT '18472043%
Overall472043%