An Algorithm Integrating and Updating Rights Management Information on Public Domain Images.- Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendation Systems.- Semantic Annotation of Scientific Publications based on Integration of Concept Knowledge.- A Study on the Methods for Establishing Security Information & Event Management.- Multi-TSV (Through Silicon Via) Error Detection Using the Non-Contact Probing Method.- Real-Time Ultra-Wide Viewing Player for Spatial and Temporal Random Access.- A Study on the Faith Score of Telephone Voices Using Machine Learning.- A comparative study of using bag-of-words and word-embedding attributes in the spoiler classification of English and Thai text.- Fall Detection of Elderly Persons by Action Recognition using Data Augmentation and State Transition Diagram.- Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data.- Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition System.- Implementation of Creation and Distribution Processes of DACS rules for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain.- Transforming YAWL Workflows into Petri Nets.
This book gathers the outcomes of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019), which was held on May 29–31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them.
The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference’s most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.