{"title":"Secure Problem Solving Scheme by Structured Natural Language","authors":"H. Yamaguchi, P. Sheu, Ryou Fujita, S. Tsujii","doi":"10.1109/ICISA.2014.6847458","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847458","url":null,"abstract":"Natural language-based problem solving is expected to be a key-issue of knowledge-intensive service functions in a cloud computing environment. In the meanwhile, privacy preserving is crucial due to the involvement of expertise (such as knowledge, experience, idea, etc.) in problems and solution. We propose a set of the cryptographic protocols for preserving the privacy of users and confidentiality of the problem solving servers.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of Educational App Repositories with Recommendation Powered by Social Tag Mining","authors":"Wen-Chung Shih","doi":"10.1109/ICISA.2014.6847328","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847328","url":null,"abstract":"Existing remedial instruction focuses on teacher-oriented or self-learning approaches. However, we think that the tutor-based approach with the support of educational repositories can provide students with an opportunity to correct their misconceptions. In this paper, the architecture is proposed to help users find suitable educational apps in repositories for the purpose of Math tutoring. The proposed recommender subsystem is combined with a social tagging mining approach. Evaluation results indicate that despite the need for further improvement, the tutoring method with the educational repositories is promising for remedial instruction.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byunghwan Lee, Minsoo Hahn, Kwangki Kim, Jinsul Kim
{"title":"Efficient Transient Signal Detection in Spatial Cue Based Multi-Channel Audio Coding","authors":"Byunghwan Lee, Minsoo Hahn, Kwangki Kim, Jinsul Kim","doi":"10.1109/ICISA.2014.6847392","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847392","url":null,"abstract":"This paper proposed the method that can efficiently detect the transient component existing in the multi-channel audio signal and accordingly extract spatial cues in order to improve the performance of the spatial cue based multi-channel audio coding. The proposed transient signal detection algorithm was implemented to use energy as well as the input signal envelope so as to successfully detect both the general transient signal and the long-duration transient signal. And it was found that the proposed method detected the transient signal more efficiently than the transient detection method using only the existing envelope through the detection of the actual transient signal.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114483561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Performance of a Classifier by Testing Only the Significant Events","authors":"Dong-Hui Kim, W. Lee","doi":"10.1109/ICISA.2014.6847472","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847472","url":null,"abstract":"In ubiquitous environment, too much information exist, and it is not easy to obtain the well classified data from the information. Therefore an algorithm which should be fast and deduce good result is needed. About it, a decision tree algorithm is much useful in the field of data mining or machine learning system for the problem of classification. However sometimes according to several reasons, a decision tree may have leaf nodes which are made of only noise data or include noise data. Therefore it should be excluded from a decision tree. Because those weak leaves is provided wrong results. This paper proposes a method using a classifier, UChoo, for solving a classification problem, and suggests how to exclude weak leaves as foreknow it whether each leaves is weak or not in decision tree. And, the experiment shows a gradient of the performance of a classifier, Uchoo, by changing the threshold for deciding between acceptable leaves and unacceptable leaves.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Preventative Measures for Ninja Hacking","authors":"Byungho Park, R. Kim, Y. B. Park","doi":"10.1109/ICISA.2014.6847344","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847344","url":null,"abstract":"Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Mood Extraction from Twitter Posts with Document Topic Model","authors":"Masahiro Ohmura, K. Kakusho, T. Okadome","doi":"10.1109/ICISA.2014.6847465","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847465","url":null,"abstract":"The method proposed here analyzes the social sentiments from collected tweets that have at least 1 of 800 sentimental or emotional adjectives. By dealing with tweets posted in a half a day as an input document, the method uses Latent Dirichlet Allocation (LDA) to extract social sentiments, some of which coincide with our daily sentiments. The extracted sentiments, however, indicate lowered sensitivity to changes in time, which suggests that they are not suitable for predicting daily social or economic events. Using LDA for the representative 72 adjectives to which each of the 800 adjectives maps while preserving word frequencies permits us to obtain social sentiments that show improved sensitivity to changes in time.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124040170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Source-Channel Rate Allocation for Wireless Video Transmission Based on Distortion Estimation","authors":"Angelo R. dela Cruz, R. Cajote","doi":"10.1109/ICISA.2014.6847418","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847418","url":null,"abstract":"Joint source channel coding provides an efficient framework in minimizing end-to-end distortion. In this paper, we propose a method of dynamically allocating the available bit rate between video encoder and channel encoder. The rate allocation algorithm is dependent on the estimated quantization and transmission distortion. We propose a quantization distortion model that is based on residual information and quantization parameter. Transmission distortion is estimated based on error propagation and error concealment distortion. Results show good estimate of the actual distortion and able to estimate the distortion before encoding the frame. The proposed distortion models are used to implement a joint source-channel video coding scheme using standard H.264/AVC encoder. The proposed scheme provides significant improvement in decoded video quality which can adapt to varying channel condition by proper allocation of available bit rate between video and channel encoder. The proposed distortion model can be extended in cross-layer optimization between channel encoder code rate and intra-refresh rate selection.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Localization Algorithm for Disaster Situation Using Flying Sensor Nodes","authors":"Abdul Aziz, I. Joe, Yeonyi Choi","doi":"10.1109/ICISA.2014.6847331","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847331","url":null,"abstract":"Due to many reasons wireless sensor networks are preferred to tackle disaster situation but it is not possible to pre-deploy sensor networks everywhere and it may not be guaranteed that disaster won't affect the functionality of pre- deployed sensor networks. In this paper it is proposed that flying wireless sensor network is a potential candidate to handle such situation and can overfly hindrances easily. This network is used to search, detect and importantly localize humans that need to be rescued. In this paper we have used trilateration in 3-D and propose that how location information can be accurately transferred from one search area to another using flying wireless sensors.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129637975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aesthetics in E-Learning Websites Interface Design Using Kansei Engineering Method","authors":"Nur Faraha Mohd Naim, Ag. Asri Ag. Ibrahim","doi":"10.1109/ICISA.2014.6847351","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847351","url":null,"abstract":"This paper presents the emotion responses between genders towards educational web design interfaces. The design concepts were categorized into three sections, text-based design, layout design and color design. The response was measured through Kansei Engineering approach in order to measure the emotion reaction towards educational web design interface between male and female students.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127250063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Music Emotion Classification Based on Music Highlight Detection","authors":"Jun-Yong Lee, Jiyeun Kim, Hyoung‐Gook Kim","doi":"10.1109/ICISA.2014.6847435","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847435","url":null,"abstract":"This paper presents a music emotion classification based on music highlight detection. To find a highlight segment of songs, we use only energy information based on normalized MDCT coefficients of audio streams. With AdaBoost algorithm, the proposed tempo feature is combined with timbre features and improves the performance of music emotion classification based on the detected music highlight segment. Experimental results confirm that the proposed method achieves preliminary promising results in terms of accuracy.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}