2014 International Conference on Information Science & Applications (ICISA)最新文献

筛选
英文 中文
Secure Problem Solving Scheme by Structured Natural Language 基于结构化自然语言的安全问题解决方案
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847458
H. Yamaguchi, P. Sheu, Ryou Fujita, S. Tsujii
{"title":"Secure Problem Solving Scheme by Structured Natural Language","authors":"H. Yamaguchi, P. Sheu, Ryou Fujita, S. Tsujii","doi":"10.1109/ICISA.2014.6847458","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847458","url":null,"abstract":"Natural language-based problem solving is expected to be a key-issue of knowledge-intensive service functions in a cloud computing environment. In the meanwhile, privacy preserving is crucial due to the involvement of expertise (such as knowledge, experience, idea, etc.) in problems and solution. We propose a set of the cryptographic protocols for preserving the privacy of users and confidentiality of the problem solving servers.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework of Educational App Repositories with Recommendation Powered by Social Tag Mining 基于社会标签挖掘的教育应用程序库推荐框架
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847328
Wen-Chung Shih
{"title":"A Framework of Educational App Repositories with Recommendation Powered by Social Tag Mining","authors":"Wen-Chung Shih","doi":"10.1109/ICISA.2014.6847328","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847328","url":null,"abstract":"Existing remedial instruction focuses on teacher-oriented or self-learning approaches. However, we think that the tutor-based approach with the support of educational repositories can provide students with an opportunity to correct their misconceptions. In this paper, the architecture is proposed to help users find suitable educational apps in repositories for the purpose of Math tutoring. The proposed recommender subsystem is combined with a social tagging mining approach. Evaluation results indicate that despite the need for further improvement, the tutoring method with the educational repositories is promising for remedial instruction.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Transient Signal Detection in Spatial Cue Based Multi-Channel Audio Coding 基于空间线索的多通道音频编码的高效瞬态信号检测
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847392
Byunghwan Lee, Minsoo Hahn, Kwangki Kim, Jinsul Kim
{"title":"Efficient Transient Signal Detection in Spatial Cue Based Multi-Channel Audio Coding","authors":"Byunghwan Lee, Minsoo Hahn, Kwangki Kim, Jinsul Kim","doi":"10.1109/ICISA.2014.6847392","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847392","url":null,"abstract":"This paper proposed the method that can efficiently detect the transient component existing in the multi-channel audio signal and accordingly extract spatial cues in order to improve the performance of the spatial cue based multi-channel audio coding. The proposed transient signal detection algorithm was implemented to use energy as well as the input signal envelope so as to successfully detect both the general transient signal and the long-duration transient signal. And it was found that the proposed method detected the transient signal more efficiently than the transient detection method using only the existing envelope through the detection of the actual transient signal.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114483561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Performance of a Classifier by Testing Only the Significant Events 仅测试重要事件的分类器性能
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847472
Dong-Hui Kim, W. Lee
{"title":"The Performance of a Classifier by Testing Only the Significant Events","authors":"Dong-Hui Kim, W. Lee","doi":"10.1109/ICISA.2014.6847472","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847472","url":null,"abstract":"In ubiquitous environment, too much information exist, and it is not easy to obtain the well classified data from the information. Therefore an algorithm which should be fast and deduce good result is needed. About it, a decision tree algorithm is much useful in the field of data mining or machine learning system for the problem of classification. However sometimes according to several reasons, a decision tree may have leaf nodes which are made of only noise data or include noise data. Therefore it should be excluded from a decision tree. Because those weak leaves is provided wrong results. This paper proposes a method using a classifier, UChoo, for solving a classification problem, and suggests how to exclude weak leaves as foreknow it whether each leaves is weak or not in decision tree. And, the experiment shows a gradient of the performance of a classifier, Uchoo, by changing the threshold for deciding between acceptable leaves and unacceptable leaves.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Preventative Measures for Ninja Hacking 忍者黑客的防范措施研究
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847344
Byungho Park, R. Kim, Y. B. Park
{"title":"A Study on Preventative Measures for Ninja Hacking","authors":"Byungho Park, R. Kim, Y. B. Park","doi":"10.1109/ICISA.2014.6847344","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847344","url":null,"abstract":"Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Mood Extraction from Twitter Posts with Document Topic Model 基于文档主题模型的Twitter帖子社交情绪提取
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847465
Masahiro Ohmura, K. Kakusho, T. Okadome
{"title":"Social Mood Extraction from Twitter Posts with Document Topic Model","authors":"Masahiro Ohmura, K. Kakusho, T. Okadome","doi":"10.1109/ICISA.2014.6847465","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847465","url":null,"abstract":"The method proposed here analyzes the social sentiments from collected tweets that have at least 1 of 800 sentimental or emotional adjectives. By dealing with tweets posted in a half a day as an input document, the method uses Latent Dirichlet Allocation (LDA) to extract social sentiments, some of which coincide with our daily sentiments. The extracted sentiments, however, indicate lowered sensitivity to changes in time, which suggests that they are not suitable for predicting daily social or economic events. Using LDA for the representative 72 adjectives to which each of the 800 adjectives maps while preserving word frequencies permits us to obtain social sentiments that show improved sensitivity to changes in time.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124040170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Joint Source-Channel Rate Allocation for Wireless Video Transmission Based on Distortion Estimation 基于失真估计的无线视频传输源信道联合速率分配
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847418
Angelo R. dela Cruz, R. Cajote
{"title":"Joint Source-Channel Rate Allocation for Wireless Video Transmission Based on Distortion Estimation","authors":"Angelo R. dela Cruz, R. Cajote","doi":"10.1109/ICISA.2014.6847418","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847418","url":null,"abstract":"Joint source channel coding provides an efficient framework in minimizing end-to-end distortion. In this paper, we propose a method of dynamically allocating the available bit rate between video encoder and channel encoder. The rate allocation algorithm is dependent on the estimated quantization and transmission distortion. We propose a quantization distortion model that is based on residual information and quantization parameter. Transmission distortion is estimated based on error propagation and error concealment distortion. Results show good estimate of the actual distortion and able to estimate the distortion before encoding the frame. The proposed distortion models are used to implement a joint source-channel video coding scheme using standard H.264/AVC encoder. The proposed scheme provides significant improvement in decoded video quality which can adapt to varying channel condition by proper allocation of available bit rate between video and channel encoder. The proposed distortion model can be extended in cross-layer optimization between channel encoder code rate and intra-refresh rate selection.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Localization Algorithm for Disaster Situation Using Flying Sensor Nodes 基于飞行传感器节点的灾情定位算法
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847331
Abdul Aziz, I. Joe, Yeonyi Choi
{"title":"A Localization Algorithm for Disaster Situation Using Flying Sensor Nodes","authors":"Abdul Aziz, I. Joe, Yeonyi Choi","doi":"10.1109/ICISA.2014.6847331","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847331","url":null,"abstract":"Due to many reasons wireless sensor networks are preferred to tackle disaster situation but it is not possible to pre-deploy sensor networks everywhere and it may not be guaranteed that disaster won't affect the functionality of pre- deployed sensor networks. In this paper it is proposed that flying wireless sensor network is a potential candidate to handle such situation and can overfly hindrances easily. This network is used to search, detect and importantly localize humans that need to be rescued. In this paper we have used trilateration in 3-D and propose that how location information can be accurately transferred from one search area to another using flying wireless sensors.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129637975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aesthetics in E-Learning Websites Interface Design Using Kansei Engineering Method 感性工学方法在电子学习网站界面设计中的美学
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847351
Nur Faraha Mohd Naim, Ag. Asri Ag. Ibrahim
{"title":"Aesthetics in E-Learning Websites Interface Design Using Kansei Engineering Method","authors":"Nur Faraha Mohd Naim, Ag. Asri Ag. Ibrahim","doi":"10.1109/ICISA.2014.6847351","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847351","url":null,"abstract":"This paper presents the emotion responses between genders towards educational web design interfaces. The design concepts were categorized into three sections, text-based design, layout design and color design. The response was measured through Kansei Engineering approach in order to measure the emotion reaction towards educational web design interface between male and female students.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127250063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Music Emotion Classification Based on Music Highlight Detection 基于音乐高光检测的音乐情感分类
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847435
Jun-Yong Lee, Jiyeun Kim, Hyoung‐Gook Kim
{"title":"Music Emotion Classification Based on Music Highlight Detection","authors":"Jun-Yong Lee, Jiyeun Kim, Hyoung‐Gook Kim","doi":"10.1109/ICISA.2014.6847435","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847435","url":null,"abstract":"This paper presents a music emotion classification based on music highlight detection. To find a highlight segment of songs, we use only energy information based on normalized MDCT coefficients of audio streams. With AdaBoost algorithm, the proposed tempo feature is combined with timbre features and improves the performance of music emotion classification based on the detected music highlight segment. Experimental results confirm that the proposed method achieves preliminary promising results in terms of accuracy.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信