Program
Wed, 9 4
Wed, 9 4 9:00 - 12:00
T1.1: How to write a good research journal paper?
Detailed slide: http://icsec2013.cp.su.ac.th/T1.1.pptx
T2.1: Introduction to HPC with Intel Xeon Phi™ Coprocessor
Parallel computing is one of the key technologies that can be employed to accelerate a large scale application in science and engineering. The new emerging manycore technology can bring an extremely high performance at the level closed to one Teraflop to a single computer. This talk will present the architecture concept of the new Intel Xeon Phi processor and introduce tools and technique that can be used to develop a compute intensive application on this platform. These include topics such as native compilation, off load compilation, some optimization. Currently, the Intel Manycore remote testing lab is successfully deployed in Kasetsart University. This Xeon-Phi remote testing access lab will be used to demonstrate the programming concept. The participant will gain some basic knowledge on how to use the manycore coprocessor to speed up their advanced HPC applications.
Slides are http://icsec2013.cp.su.ac.th/T1.2.pdf
Wed, 9 4 13:00 - 16:00
T1.2: OpenStack Cloud and Fault Tolerance
This tutorial aims to give an introduction to OpenStack and demonstrate how to use the software. OpenStack is an Open Source IaaS Cloud management software that has received a lot of attentions recently. The software has a large user-base and has been deployed by many companies to build private and public cloud around the world. The tutorial will have two parts. The first part will discuss its history, the overall architecture, and its key components such as keystone, nova, glance, and quantum. In the Second part, we will give a demo showing how to use OpenStack to create and use Virtual Machines and networks.
Slides are at http://icsec2013.cp.su.ac.th/T1.2.pdf
T2.2: Getting to know programming with MapReduce
In a world of rapidly increasing storage requirements, the need for storage systems of massive size and high performance is emerging. Distributed storage systems provide a way to store enormous amounts of data, while allowing incremental upgrades to improve system performance and storage capacity such as processing documents on a cluster of commodity machines or deployed and run through cloud systems. Furthermore, Data-intensive computing that process large volumes of data typically terabyte (1012) or petabyte (1015) or exabyte (1018) and so on in size is a challenge in terms of their processing time to I/O and manipulation of data.
MapReduce is a simple and powerful programming model that enables easy development of scalable parallel applications to process vast amounts of data on a large cluster of commodity machines. With large clusters of machines, it becomes important to have a simple monitoring framework that provides a visual indication of how the cluster is and has been performing.
In this session, we present the Hadoop MapReduce, the Architecture of Hadoop Distributed File System, an example of MapReduce, the Development of a MapReduce application using Java, data analysis with Hadoop MapReduce and a case study on MapReduce applications.
Slides are at http://icsec2013.cp.su.ac.th/T2.2.pdf
Thu, 9 5
Thu, 9 5 9:30 - 10:15
K1: Data Fusion for 3D Urban Scene Modeling and Understanding
In this talk we will present our recent work in 3D urban scene modeling and understanding by fusion of large scale multi-modality data such as airborne and terrestrial LIDAR, airborne and ground based video and images with a focus on 3D reconstruction, 3D segmentation, and 3D compression. We will also discuss our recent work in virtual navigation of the interior spaces of urban structures, rock geo-mechanics analysis for highway safety, etc.
Slides can be obtained from http://icsec2013.cp.su.ac.th/K1.pdf
Thu, 9 5 10:15 - 11:15
WS-Key: Keynote for WS- ontology: Ontological Engineering for Big Data
For efficient and innovative use of big data, it is important to integrate multiple data bases across domains. For example, various public data bases are developed in life science, and how to find a novel scientific result using them is an essential technique. In social and business areas, open data strategies in many countries promote diversity of public data, how to combine big data and open data is a big challenge. That is, diversity of dataset is a problem to be solved for big data. Ontology gives a systematized knowledge to integrate multiple datasets across domains with semantics of them. Linked Data also provides techniques to interlink datasets based on semantic web technologies. We consider that combinations of ontology and Linked Data based on ontological engineering can contribute to solution of diversity problem in big data. In this talk, I discuss how ontological engineering could be applied to big data with some trial examples. I also give a brief introductions on the current state of Linked Open Data (LOD) activities.
Slides are at http://www.slideshare.net/KoujiKozaki/ontology-engineering-for-big-data
Thu, 9 5 10:30 - 11:15
K2: Introduction to big data technology, big data revolution in healthcare, and big data analytic for retail.
Slides are available at http://icsec2013.cp.su.ac.th/K2.rar
Thu, 9 5 11:15 - 12:30
WS1: WS-Ontology
- A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web
- Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System
- Large RDF Representation Framework for GPUs Case Study Key-Value Storage and Binary Triple Pattern
- Semantically Enabled Academic Paper Sharing Used in a Seminar Course
- Extracting Semantic Metadata for Effective Spreadsheet Search
Thu, 9 5 11:30 - 12:30
IT1: Information Technology
PAR1: Parallel/Distributed Computing
- Online Code Editor on Private Cloud Computing
- Efficient Energy Aware Task Scheduling for Parallel Workflow Tasks on Hybrids Cloud Environment
- A High Performance Computing for AOM Stock Trading Order Matching Using GPU
- Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI
Thu, 9 5 11:30 - 12:45
THA2: Workshop and Algorithms
- The Core Retail Management Software with Big Data Integration
- A Comparative Study of Compression Algorithms for Each Data Type
- Acupuncture Expert System for Office Syndrome
- Web Service Discovery Using Semantic-based Service Search Agent
- Applying L-System for Thai Traditional Music Composing by Accent
Thu, 9 5 13:00 - 14:45
P1: CSE Education : Teaching sustainable knowledge
In this panel, we are welcome the discussion for finding the innovation in teaching computer science and engineering fields for Thai students. Current computer and information technology has been growing fast in the past decade. Since the new technology has come around everyday, the related body of knowledge has been gradually evolved. We are opening the discussions to seek for innovation and techniques in teaching in the field to develop the computer science and engineering graduate that have skills and core knowledge which can sustain the changes in the fields. The industry and academic institutions are welcome to share their opinions and experiences. The expected outcome from this panel is the best practice in necessary skill development and sustainable core body of knowledge.
Points to address here:
Motivation: challenges in developments of computer science/engineering graduates Knowledge: What is the computer science/engineering body of knowledge? People: What is the qualification of the desired graduate by the industry? Process: Teaching process/innovation for achieving both knowledges and skills? Collaboration: What are possible collaborations among academic instiutions and industry?
What is next? What is the impact of this forum outcome ? -next discussion forum/next action
Guest speakers from industry: Microsoft, Intel, IBM, Wealth Academic guests from KMUTT, Mahidol, Chula, KMUTNB and we welcome more lecturer participants!!
Thu, 9 5 13:30 - 14:30
IT2: Information Technnology
Thu, 9 5 13:30 - 14:45
PAR2: Parallel/ Distributed Computing & Network
- Design and Comparative Analysis of DSS Queries in Distributed Environment
- Evaluating a Two Dimensional Box Packing Algorithm on Batch Processing Cluster Job Scheduling Problem
- PID Controller Tuning and Optimizing for Greenhouse Lighting Application Considering Real-Time Pricing in the Smart Grid
- Smart Device Sensing Architectures and Applications
- The Comprehensive Guiding and Navigation Services on Smart Phones
Thu, 9 5 13:30 - 14:30
THA1: Thai Track1 (Ontology and IT)
Thu, 9 5 15:00 - 16:30
DM1: Data Mining, Knowledge Management and Analytics
- Outlier Detection Score Based on Ordered Distance Difference
- Prefix Filtering with Data Partitioning for Similarity Join
- Farthest Boundary Clustering Algorithm: Half-orbital Extreme Pole
- A Comparison of Spatial Interpolation Methods for Surface Temperature in Thailand
- A Design Pattern Knowledge Base and Its Application to Sequence Diagram Design
- Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection
COM1: Computational Theory
- Radius Particle Swarm Optimization
- Prediction Oriented Analysis of Optimal Replacement
- Automatic Removal of EEG Artifacts Using ICA and Lifting Wavelet Transform
- Applying a Mixed Objective Model in a University Timetabling Solution Searching Technique
- Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding
- Characterization of Personal Behavior with Enhanced Spherical Self Organizing Map
Thu, 9 5 15:00 - 16:15
THA3: Artificial Intelligence
- Improvement Query in Thesis and Research Database Using Particle Swarm Optimization
- Affecting Behavior Analysis for the Treatment of Pulmonary Tuberculosis Using Data Mining Techniques: Case Study of Muang Sakon Nakhon Public Health Office
- A Classification Improvement of Extreme Learning Machine Classifier by Feature Selection
- Extreme Learning Machine for Pre-Hypertension Classification
- A Comparison of Statistical Downscaling for Temperature in Thailand by Regression Analysis
Fri, 9 6
Fri, 9 6 9:00 - 9:45
K3: Big Data - Top 5 practical uses cases of Big Data
Over the last decade the data has grown many folds in volume, velocity and most importantly in variety! For many organizations Big Data is a buzz word. While market specialists keep churning out articles, talks, trainings and workshops to demystify the confusion, this topic still continues to carry its mystery.
This talk will attempt to explain Big Data concepts with 5 most practical use cases which are used by various organizations in real life today. This talk will present 5 use cases for the following fields.
-
Science/R&D
-
Social Media
-
Govt/Enterprises
-
Finance
-
Media Industry
The talk will briefly explain the issues faced by the various fields and the big data solutions applied to solve/mitigate the challenges.
Fri, 9 6 9:50 - 10:35
K4: Connecting BigData with Business Analytics
If your organization is like many, you're capturing and sharing more data from more sources than ever before. As a result, you're facing the challenge of managing high-volume and high-velocity data streams quickly and analytically.
Big Data is all about finding a needle of value in a haystack of unstructured information. Companies are now investing in solutions that interpret consumer behavior, detect fraud, and even predict the future! McKinsey released a report in May 2011 stating that leading companies are using big data analytics to gain competitive advantage. They predict a 60% margin increase for retail companies who are able to harvest the power of big data.
To support these new analytics, IT strategies are mushrooming, the newest techniques include brute force assaults on massive information sources, and filtering data through specialized parallel processing and indexing mechanisms. The results are correlated across time and meaning, and often merged with traditional corporate data sources. New data discovery techniques include spectacular visualization tools and interactive semantic query experiences. Knowledge workers and data scientists sift through filtered data asking one unrelated explorative question after another. As these supporting technologies emerge from graduate research programs into the world of corporate IT, IT strategists, planners, and architects need to both understand them and ensure that they are enterprise grade.
Slides are at http://icsec2013.cp.su.ac.th/K4.pptx
Fri, 9 6 11:00 - 12:30
NET1: Computer Network
- Multipath Query Spreading Over Vehicular Ad-hoc Networks
- Path-Reputation Based Technique in Reactive AODV Ad Hoc Sensor Networks Routing for Flood Warning Application
- A Novel Personal Health Record System for Handling Emergency Situations
- Of Order-Handoffs for Hyper-Erlang Traffics in Cellular Wireless Networks
- Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network
- A Web-based Management System Design for Wireless Sensor Network Monitoring
MUL1: Multimedia
- Virtual Piano with Real-Time Interaction Using Automatic Marker Detection
- Musical-scale Characteristics for Traditional Thai Music Genre Classification
- Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs
- On Building PCA/ ICA Deformable Facial Models
- Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis
- Handwritten Curve Approximation by a Bézier Curve with Featured Points
COM2: Computational Intelligence
- Handwritten Recognition on Pali Cards of Buddhadasa Indapanno
- A Nondominated Adversarial Search Algorithm for a Three-player Chess Game
- Web Page Template Design Using Interactive Genetic Algorithm
- A Frequency-Based Updating Strategy in Compact Genetic Algorithm
- A Mobile Emotion Recognition System Based on Speech Signals and Facial Images
- Support Vector Machine Accuracy Improvement with k-Means Clustering
THA4: Network & Security
- Application of Game Theory to Vertical Handoff Decision Scheme Within Heterogeneous Mobile Communication Network
- Applying Wireless Sensor Network Based on ZigBee/IEEE802.15.4 Standard for Railway Crossing System
- How Good is Food as a CAPTCHA?
- Authentication Protocol on Wireless Sensor Networks Based on Hybrid Cryptographic Technique
- Effects of Image Priming on Recall of Password
- Key Stroke Dynamics Authentication with Trajectory Dissimilarity
Fri, 9 6 13:30 - 14:30
NET2: Computer Network
- MVFactor: A Method to Decrease Processing Time for Factorization Algorithm
- Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing
- Analysis Model for Measuring Information Flow in Social Networks
- Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance
Fri, 9 6 13:30 - 14:45
MUL2: Multimedia
- The Last Eternity, a 3D Role-Playing Game with a Cross-Platform Development
- Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study
- Buddhist Amulet Coin Recognition by Genetic Algorithm
- On the Comparison of Digital Image Steganography Algorithm Based on DCT and Wavelet
- Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images
COM3: Computational Intelligence
- Improving the Running Time of the Nearest Neighbor Algorithm
- Evolutionary Circular Extreme Learning Machine
- A Performance Evaluation of a Probabilistic Parallel Genetic Algorithm: FPGA Vs Multi-core Processor
- Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm
- Estimation of Recursive Order Number of a Photocopied Document Through Entropy From Gray Level Co-occurrence Matrix
Fri, 9 6 13:30 - 14:30
THA5: Image Processing
- Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures
- A Search and Recognition Approach Car License Plate Under Traffic CCTV Environment
- Image Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images by Using Active Contour Model
- A Comparative of the Methods to Find Fingertips and Valleys Based on Images Processing