2014 International Conference on Information Science & Applications (ICISA)最新文献

筛选
英文 中文
Two-Level Scheduling Framework with Frame Level Scheduling and Exponential Rule in Wireless Network 无线网络中具有帧级调度和指数规则的两级调度框架
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847476
Ee Mae Ang, K. Wee, Ying-Han Pang, S. Lau
{"title":"Two-Level Scheduling Framework with Frame Level Scheduling and Exponential Rule in Wireless Network","authors":"Ee Mae Ang, K. Wee, Ying-Han Pang, S. Lau","doi":"10.1109/ICISA.2014.6847476","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847476","url":null,"abstract":"Based on the ongoing development in the Long Term Evolution (LTE), it was brought in to satisfy user's needs and demands on the enhancement of the wireless network's Quality of Service, especially for real-time applications. Real-time applications require low delay; in order to have a better user's experience. Hence, a scheduling framework focuses on real-time applications has been proposed and developed in this study. This paper compares the performance of real-time scheduling frameworks; 1) Modified-Largest Weighted Delay First (M-LWDF), 2) Frame Level Scheduler (FLS) and Proportional Fair downlink scheduler, and 3) our proposed two-level scheduling framework (FLS-M-EXP). Tests are carried out on these scheduling methods, and the data produced are gathered and analyzed. Simulation results showed that the proposed two-level scheduling framework with FLS and Exponential Rule (EXP) has a better performance in terms of delay as compared to the existing scheduling framework, which consists of FLS and Proportional Fair method. The proposed two-level scheduling framework also performs better than the common real-time scheduler, M-LWDF.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Learning Model for Assessing Loss Severity of Operational Risk 操作风险损失严重性评估的学习模型
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847421
Chawis Taweerojkulsri, Y. Limpiyakorn
{"title":"Learning Model for Assessing Loss Severity of Operational Risk","authors":"Chawis Taweerojkulsri, Y. Limpiyakorn","doi":"10.1109/ICISA.2014.6847421","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847421","url":null,"abstract":"Risks, deficiencies and other issues identified within the organization should be evaluated and assessed with regard to their severity and significance. Operational risk is one of the risk categories within the banking and financial services community. It is defined as the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. Scenario analyses and risk assessments based on expert opinion should be frequently validated and reassessed by comparing them to actual loss data available over time. On contrary, this paper presents a quantitative operational risk assessment using the technique of backpropagation neural network. The multiple risk causes and resulting loss form a network of interdependencies as a learning model. The risk scenarios collected from expert judgment represents training instances of causal chains and effects. The output model could be used as the substitute of expert assessments for the mature organizations where operational loss data are available.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metadata Schema for Augmented Reality 增强现实的元数据模式
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847425
T. Ishikawa, Je-Ho Park
{"title":"Metadata Schema for Augmented Reality","authors":"T. Ishikawa, Je-Ho Park","doi":"10.1109/ICISA.2014.6847425","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847425","url":null,"abstract":"In this paper, we present a metadata schema design for augmented reality based on workflow. Utilizing the schema, the necessary information for processing of augmented reality service can be utilized for efficient system configuration.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Point-Based Image Descriptors 基于点的图像描述符性能评价
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847445
S. Sundaram, Yong-Hwan Lee, Youngseop Kim, Je-Ho Park, Han-Sang Cho
{"title":"Performance Evaluation of Point-Based Image Descriptors","authors":"S. Sundaram, Yong-Hwan Lee, Youngseop Kim, Je-Ho Park, Han-Sang Cho","doi":"10.1109/ICISA.2014.6847445","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847445","url":null,"abstract":"Since feature extraction not only plays a key role, but also have a great effect on image analysis and registration. In this paper, we evaluate a comparative performance of three point feature extraction algorithm such as SIFT, SURF and BRISK. The experimental results show that SURF exhibited a better significant results on extracting point features and matching time, compared to SIFT and BRISK. The objective of this research is to provide a decision support which one should be chosen and acceptable among point-based image descriptors in the industrial field.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Ensemble Learning Approach for Concept Drift 概念漂移的集成学习方法
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847357
Jia-Wei Liao, Bi-Ru Dai
{"title":"An Ensemble Learning Approach for Concept Drift","authors":"Jia-Wei Liao, Bi-Ru Dai","doi":"10.1109/ICISA.2014.6847357","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847357","url":null,"abstract":"Recently, concept drift has become an important issue while analyzing non-stationary distribution data in data mining. For example, data streams carry a characteristic that data vary by time, and there is probably concept drift in this type of data. Concept drifts can be categorized into sudden and gradual concept drifts in brief. Most of research only can solve one type of concept drift. However, in the real world, a data stream probably has more than one type of concept drift, and the type is usually difficult to be identified. In light of these reasons, we propose a new weighting method which can adapt more quickly to current concept than other methods and can improve the accuracy of classification on data streams with concept drifts.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122272409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design of System Framework for Searching Medical Information 医学信息检索系统框架设计
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847384
Sung-Ho Hong, Youngseop Kim, Yong-Hwan Lee, Je-Ho Park
{"title":"Design of System Framework for Searching Medical Information","authors":"Sung-Ho Hong, Youngseop Kim, Yong-Hwan Lee, Je-Ho Park","doi":"10.1109/ICISA.2014.6847384","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847384","url":null,"abstract":"This work aims to find the medical information suited to the conditions, by analyzing the keywords provided from an user. With the given information, this model can be used to provide a flexible, compatible and effective searching paper for medical information. The proposed framework which helps medical institutions to search medical information in conjunction with analysis of user's request. The framework mainly includes key component of metadata for searching the medical information suited to the conditions.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of Violation of IEEE Publication PrinciplesAttendance System Using NFC Technology and Embedded Camera Device on Mobile Phone 违反IEEE发布原则的通知使用NFC技术和手机嵌入式摄像设备的考勤系统
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847368
Puchong Subpratatsavee, Tanabat Promjun, W. Siriprom, W. Sriboon
{"title":"Notice of Violation of IEEE Publication PrinciplesAttendance System Using NFC Technology and Embedded Camera Device on Mobile Phone","authors":"Puchong Subpratatsavee, Tanabat Promjun, W. Siriprom, W. Sriboon","doi":"10.1109/ICISA.2014.6847368","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847368","url":null,"abstract":"In Thailand University, checking student attendance is one of the important issues for universities, because many universities evaluate students' attendance and while giving the final grade, professors consider their total number of appearances on classes during the whole semester. This brings to the idea of having some tool to control students' attendance. Some universities prefer to use paper sheet for controlling attendance, whereas some universities prefer to use paper sheet for checking students' attendance and after this, fill out these information into a system manually, like Kasetsart University Si Racha Campus does. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like \"presence\" or \"absence\" if the class is a lecture class, and in this class at least 5 groups are presented. Moreover, some students may call his/her friend as \"presence\" even though this student is currently absent. After thinking all these issues, researcher of the following research paper decided to create a system that makes easier to check students' attendance automatically, and this system is implemented in Kasetsart University Si Racha, Thailand. Actually, this is the first time when such kind of system is being used in educational system of Thailand. The system is based on NFC technology and run on mobile application, and in this paper, details of this system are presented.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Primal-Dual Interior-Point Algorithm for Semidefinite Optimization 半定优化的一种新的原对偶内点算法
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847334
Yong-Hoon Lee, Jin-Hee Jin, G. Cho
{"title":"A New Primal-Dual Interior-Point Algorithm for Semidefinite Optimization","authors":"Yong-Hoon Lee, Jin-Hee Jin, G. Cho","doi":"10.1109/ICISA.2014.6847334","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847334","url":null,"abstract":"We propose a new primal-dual interior-point algorithm for semidefinite optimization(SDO) based on an eligible barrier function. New search directions and proximity measures are proposed based on the barrier function. We show that the algorithm has O(√n log(n/ε)) and O(√n(log n)log(n/ε)) complexity results for small- and large-update methods, respectively. These are the best known complexity results for such methods.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Reasons behind the Low ISO 27001 Adoption in Public Organizations in Saudi Arabia 探讨沙特阿拉伯公共机构ISO 27001采用率低的原因
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847396
K. I. AlShitri, Abdulmohsen Abanumy
{"title":"Exploring the Reasons behind the Low ISO 27001 Adoption in Public Organizations in Saudi Arabia","authors":"K. I. AlShitri, Abdulmohsen Abanumy","doi":"10.1109/ICISA.2014.6847396","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847396","url":null,"abstract":"The main purpose of this paper is to investigate the reason behind the low adoption of the ISO 27001 standard in the public organizations in Saudi Arabia. Human resource management issues such as shortage of information security expertise, lack of training, education, and awareness programs, and high salary demand for security professionals were found to be the most significant barriers to the successful implementation of ISO 27001 in public organizations in Saudi Arabia. Implications for public organizations management and future research are discussed at the end of this paper.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of Cloud Computing Performance, Scalability, Availability, & Security 云计算性能、可扩展性、可用性和安全性分析
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847363
Shoaib Hassan, Asim Abbas Kamboh, F. Azam
{"title":"Analysis of Cloud Computing Performance, Scalability, Availability, & Security","authors":"Shoaib Hassan, Asim Abbas Kamboh, F. Azam","doi":"10.1109/ICISA.2014.6847363","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847363","url":null,"abstract":"Cloud Computing means that a relationship of many number of computers through a contact channel like internet. Through cloud computing we send, receive and store data on internet. Cloud Computing gives us an opportunity of parallel computing by using a large number of Virtual Machines. Now a days, Performance, scalability, availability and security may represent the big risks in cloud computing. In this paper we highlights the issues of security, availability and scalability issues and we will also identify that how we make our cloud computing based infrastructure more secure and more available. And we also highlight the elastic behavior of cloud computing. And some of characteristics which involved for gaining the high performance of cloud computing will also be discussed.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信