{"title":"Two-Level Scheduling Framework with Frame Level Scheduling and Exponential Rule in Wireless Network","authors":"Ee Mae Ang, K. Wee, Ying-Han Pang, S. Lau","doi":"10.1109/ICISA.2014.6847476","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847476","url":null,"abstract":"Based on the ongoing development in the Long Term Evolution (LTE), it was brought in to satisfy user's needs and demands on the enhancement of the wireless network's Quality of Service, especially for real-time applications. Real-time applications require low delay; in order to have a better user's experience. Hence, a scheduling framework focuses on real-time applications has been proposed and developed in this study. This paper compares the performance of real-time scheduling frameworks; 1) Modified-Largest Weighted Delay First (M-LWDF), 2) Frame Level Scheduler (FLS) and Proportional Fair downlink scheduler, and 3) our proposed two-level scheduling framework (FLS-M-EXP). Tests are carried out on these scheduling methods, and the data produced are gathered and analyzed. Simulation results showed that the proposed two-level scheduling framework with FLS and Exponential Rule (EXP) has a better performance in terms of delay as compared to the existing scheduling framework, which consists of FLS and Proportional Fair method. The proposed two-level scheduling framework also performs better than the common real-time scheduler, M-LWDF.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Model for Assessing Loss Severity of Operational Risk","authors":"Chawis Taweerojkulsri, Y. Limpiyakorn","doi":"10.1109/ICISA.2014.6847421","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847421","url":null,"abstract":"Risks, deficiencies and other issues identified within the organization should be evaluated and assessed with regard to their severity and significance. Operational risk is one of the risk categories within the banking and financial services community. It is defined as the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. Scenario analyses and risk assessments based on expert opinion should be frequently validated and reassessed by comparing them to actual loss data available over time. On contrary, this paper presents a quantitative operational risk assessment using the technique of backpropagation neural network. The multiple risk causes and resulting loss form a network of interdependencies as a learning model. The risk scenarios collected from expert judgment represents training instances of causal chains and effects. The output model could be used as the substitute of expert assessments for the mature organizations where operational loss data are available.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metadata Schema for Augmented Reality","authors":"T. Ishikawa, Je-Ho Park","doi":"10.1109/ICISA.2014.6847425","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847425","url":null,"abstract":"In this paper, we present a metadata schema design for augmented reality based on workflow. Utilizing the schema, the necessary information for processing of augmented reality service can be utilized for efficient system configuration.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sundaram, Yong-Hwan Lee, Youngseop Kim, Je-Ho Park, Han-Sang Cho
{"title":"Performance Evaluation of Point-Based Image Descriptors","authors":"S. Sundaram, Yong-Hwan Lee, Youngseop Kim, Je-Ho Park, Han-Sang Cho","doi":"10.1109/ICISA.2014.6847445","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847445","url":null,"abstract":"Since feature extraction not only plays a key role, but also have a great effect on image analysis and registration. In this paper, we evaluate a comparative performance of three point feature extraction algorithm such as SIFT, SURF and BRISK. The experimental results show that SURF exhibited a better significant results on extracting point features and matching time, compared to SIFT and BRISK. The objective of this research is to provide a decision support which one should be chosen and acceptable among point-based image descriptors in the industrial field.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ensemble Learning Approach for Concept Drift","authors":"Jia-Wei Liao, Bi-Ru Dai","doi":"10.1109/ICISA.2014.6847357","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847357","url":null,"abstract":"Recently, concept drift has become an important issue while analyzing non-stationary distribution data in data mining. For example, data streams carry a characteristic that data vary by time, and there is probably concept drift in this type of data. Concept drifts can be categorized into sudden and gradual concept drifts in brief. Most of research only can solve one type of concept drift. However, in the real world, a data stream probably has more than one type of concept drift, and the type is usually difficult to be identified. In light of these reasons, we propose a new weighting method which can adapt more quickly to current concept than other methods and can improve the accuracy of classification on data streams with concept drifts.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122272409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Ho Hong, Youngseop Kim, Yong-Hwan Lee, Je-Ho Park
{"title":"Design of System Framework for Searching Medical Information","authors":"Sung-Ho Hong, Youngseop Kim, Yong-Hwan Lee, Je-Ho Park","doi":"10.1109/ICISA.2014.6847384","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847384","url":null,"abstract":"This work aims to find the medical information suited to the conditions, by analyzing the keywords provided from an user. With the given information, this model can be used to provide a flexible, compatible and effective searching paper for medical information. The proposed framework which helps medical institutions to search medical information in conjunction with analysis of user's request. The framework mainly includes key component of metadata for searching the medical information suited to the conditions.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Puchong Subpratatsavee, Tanabat Promjun, W. Siriprom, W. Sriboon
{"title":"Notice of Violation of IEEE Publication PrinciplesAttendance System Using NFC Technology and Embedded Camera Device on Mobile Phone","authors":"Puchong Subpratatsavee, Tanabat Promjun, W. Siriprom, W. Sriboon","doi":"10.1109/ICISA.2014.6847368","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847368","url":null,"abstract":"In Thailand University, checking student attendance is one of the important issues for universities, because many universities evaluate students' attendance and while giving the final grade, professors consider their total number of appearances on classes during the whole semester. This brings to the idea of having some tool to control students' attendance. Some universities prefer to use paper sheet for controlling attendance, whereas some universities prefer to use paper sheet for checking students' attendance and after this, fill out these information into a system manually, like Kasetsart University Si Racha Campus does. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like \"presence\" or \"absence\" if the class is a lecture class, and in this class at least 5 groups are presented. Moreover, some students may call his/her friend as \"presence\" even though this student is currently absent. After thinking all these issues, researcher of the following research paper decided to create a system that makes easier to check students' attendance automatically, and this system is implemented in Kasetsart University Si Racha, Thailand. Actually, this is the first time when such kind of system is being used in educational system of Thailand. The system is based on NFC technology and run on mobile application, and in this paper, details of this system are presented.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Primal-Dual Interior-Point Algorithm for Semidefinite Optimization","authors":"Yong-Hoon Lee, Jin-Hee Jin, G. Cho","doi":"10.1109/ICISA.2014.6847334","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847334","url":null,"abstract":"We propose a new primal-dual interior-point algorithm for semidefinite optimization(SDO) based on an eligible barrier function. New search directions and proximity measures are proposed based on the barrier function. We show that the algorithm has O(√n log(n/ε)) and O(√n(log n)log(n/ε)) complexity results for small- and large-update methods, respectively. These are the best known complexity results for such methods.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Reasons behind the Low ISO 27001 Adoption in Public Organizations in Saudi Arabia","authors":"K. I. AlShitri, Abdulmohsen Abanumy","doi":"10.1109/ICISA.2014.6847396","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847396","url":null,"abstract":"The main purpose of this paper is to investigate the reason behind the low adoption of the ISO 27001 standard in the public organizations in Saudi Arabia. Human resource management issues such as shortage of information security expertise, lack of training, education, and awareness programs, and high salary demand for security professionals were found to be the most significant barriers to the successful implementation of ISO 27001 in public organizations in Saudi Arabia. Implications for public organizations management and future research are discussed at the end of this paper.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Cloud Computing Performance, Scalability, Availability, & Security","authors":"Shoaib Hassan, Asim Abbas Kamboh, F. Azam","doi":"10.1109/ICISA.2014.6847363","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847363","url":null,"abstract":"Cloud Computing means that a relationship of many number of computers through a contact channel like internet. Through cloud computing we send, receive and store data on internet. Cloud Computing gives us an opportunity of parallel computing by using a large number of Virtual Machines. Now a days, Performance, scalability, availability and security may represent the big risks in cloud computing. In this paper we highlights the issues of security, availability and scalability issues and we will also identify that how we make our cloud computing based infrastructure more secure and more available. And we also highlight the elastic behavior of cloud computing. And some of characteristics which involved for gaining the high performance of cloud computing will also be discussed.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}