{"title":"Weighted Combination of Q&A Retrieval Models Based on Part-of-Speech of Question Word","authors":"Doo Soo Chang, Y. Choi","doi":"10.1109/ICISA.2014.6847483","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847483","url":null,"abstract":"Question and answer archives have become useful information resources with increase of community based question and answer service. For effective question and answering system, it is important to find semantically similar questions and retrieve its answer from the archive for user's question. In this paper, we propose a weighted combination of retrieval models for question and answer archives. In contrast to well-known translation based language model, the proposed model reflects significance of each word in user's question by giving variant weight to the word depending on its part-of-speech. In experiment, our model improves performance considerably when compared to conventional ones.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth Provisioning with QoS User Utility Function in NUM","authors":"Hengky Susanto, Byung Kim","doi":"10.1109/ICISA.2014.6847370","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847370","url":null,"abstract":"This paper primarily addresses the design of user utility function for network utility maximization (NUM) problems. The general approach of current existing user utility models is designed to reflect network's ability to meet the minimum bandwidth requirement. In contrast, user satisfaction is also often influenced by user experience with the quality of service (QoS), the cost to attain the service, and functional of the product. With this new perspective, we show a new insight of how user makes decision on transmission rate.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Intrusion Detection Using Multi-Criteria PROAFTN Classification","authors":"F. Al-Obeidat, El-Sayed M. El-Alfy","doi":"10.1109/ICISA.2014.6847436","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847436","url":null,"abstract":"Network intrusion is recognized as a chronic and recurring problem. Hacking techniques continually change and several countermeasure methods have been suggested in the literature including statistical and machine learning approaches. However, no single solution can be claimed as a rule of thumb for the wide spectrum of attacks. In this paper, a novel methodology is proposed for network intrusion detection based on the multicriteria PROAFTN classification. The algorithm is evaluated and compared on a publicly available and widely used dataset. The results in this paper show that the proposed algorithm is promising in detecting various types of intrusions with high classification accuracy.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127772351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Building Energy Management System Based on Facility Sensor Networks","authors":"Jongwoo Choi, Youn-Kwae Jeong, Il-Woo Lee","doi":"10.1109/ICISA.2014.6847326","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847326","url":null,"abstract":"This paper presents the structural review of a building energy management system (BEMS) based on facility sensor networks for each facility in the target building. To make BEMS works, sensors have to be installed for each facility in the target building. Sensors for each facility are connected to the data acquisition device (DAQ) and construct a sensor network. Each DAQ in a facility sensor network is connected to the gateway. Building working information is transferred from the gateway to the BEMS server. The BEMS uses collected data to analyze the building energy usage status and facility efficiencies. Several methods are possible for analyzing building working status based on status data. The easiest method is comparing realtime data to the spec data. Comparing realtime data to the building simulation result is the hardest method. To make BEMS works efficiently, it is possible to design BEMS as a multi-engine based system.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116928408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Aware I/O Scheduler for Flash Drives","authors":"Woong Sul, Hyeonsang Eom, H. Yeom","doi":"10.1109/ICISA.2014.6847394","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847394","url":null,"abstract":"Today's large data centers become cautious about its massive energy consumption. Range of efforts were made to reduce energy consumption from hardware to software level. Meanwhile, advance of technologies and engineering efforts makes flash-based drive an affordable option with higher capacity in the storage. Though this class of storage drive basically use less energy, the energy efficiency of I/O operation varies with different size of I/O requests. We observed that the energy efficiency is degraded with a small size write request in flash drives. This paper describes energy-efficient I/O scheduler for flash drives. Our I/O scheduler merges small size of write requests for better energy efficiency and as a result it reduces the total energy consumption. We evaluated the scheduler simulation with the small-size-dominant trace from TPC-C. The result shows that the total energy consumption are decreased by 17.2%.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Gesture Recognition Based on Cognitive Behavioral Model","authors":"T. Zhang, Zhiquan Feng, Yuanyuan Su, F. Min","doi":"10.1109/ICISA.2014.6847463","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847463","url":null,"abstract":"Semantic gesture recognition based on video has an important research significance in the field of human-computer interaction. This paper proposes a semantic gesture recognition method based on the cognitive behavioral model. first, through analyzing the movement behavior of hand, we set up the transition probability matrix of semantic gestures. Second, set DDF-HMM model of semantic gesture. Then cognitive behavioral model is set up. According to the transition probability matrix, we could get the most likely semantic gesture of an unknown gesture. Then use the DDF-HMM model to identify semantic gesture. DDF-HMM method reduced gesture features' dimension to a low level, then greatly reduced the complexity of the model. We recognized 4 kinds of semantic gestures, and the average recognition rate is 96.5%. The experimental results showed that this method can effectively distinguish different semantic gestures, and is more effective than Hu variant moments method.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134206123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linguistic Patterns-Based Translation for Natural Language Interface","authors":"N. Sharef, S. Noah","doi":"10.1109/ICISA.2014.6847424","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847424","url":null,"abstract":"Semantic technology improves classical information retrieval by representing the information in a structured form and with notion of understanding. The querying process however requires formal language which could be challenging to novice users. The natural language interface research addresses this issue by translating the user's question into the formal query. Existing studies have provided limited question understanding coverage due to limitation on single triple translation only. This paper addresses deeper understanding of semantic natural language through twelve linguistic patterns. The result has shown that the method manages to extract the linguistic expressions and aid the translation process. This concludes that wider linguistic coverage can be provided by higher linguistic expressions processing.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seung Woo Cho, M. Cha, S. Kim, Joo Cheol Song, Kyung-ah Sohn
{"title":"Investigating Temporal and Spatial Trends of Brand Images Using Twitter Opinion Mining","authors":"Seung Woo Cho, M. Cha, S. Kim, Joo Cheol Song, Kyung-ah Sohn","doi":"10.1109/ICISA.2014.6847417","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847417","url":null,"abstract":"The growing popularity of social network services has led to many studies of various phenomena in this area. However, most of this research has been conducted using English language data, and relatively little has considered Korean. In this paper, we demonstrate a systematic analysis framework using Korean Twitter data to mine temporal and spatial trends of brand images. A publicly available Korean morpheme analyzer is used to analyze Korean tweets grammatically, and we construct Korean polarity dictionaries containing a noun, adjective, verb, and/or root to automatically analyze the sentiment of each tweet message. Sentiment classification is performed by a support vector machine and multinomial naïve Bayes classifier. In particular, our own feature selection step improves the support vector machine sentiment classification accuracy to 80%. Based on this result, we visualize the temporal and spatial distribution of brand images, and present the temporal changes of brand-related keyword networks. Our analysis enables trends in brand awareness to be systematically traced and evaluated. This allows various other analyses, such as advantages and disadvantages of the brand, and a comparison with its competitors.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authorship Attribution Analysis of Thai Online Messages","authors":"Rangsipan Marukatat, Robroo Somkiadcharoen, Ratthanan Nalintasnai, Tappasarn Aramboonpong","doi":"10.1109/ICISA.2014.6847369","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847369","url":null,"abstract":"This paper presents a framework to identify the authors of Thai online messages. The identification is based on 53 writing attributes and the selected algorithms are support vector machine (SVM) and C4.5 decision tree. Experimental results indicate that the overall accuracies achieved by the SVM and the C4.5 were 79% and 75%, respectively. This difference was not statistically significant (at 95% confidence interval). As for the performance of identifying individual authors, in some cases the SVM was clearly better than the C4.5. But there were also other cases where both of them could not distinguish one author from another.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Utilization Study of Domestic Thematic Map for Military Terrain Analysis Cartography","authors":"Eun-seok Lee, Jong-bae Kim","doi":"10.1109/ICISA.2014.6847347","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847347","url":null,"abstract":"As the type of property data of military terrain analysis map is using FACC of DIGEST, there is a limitation in utilizing a domestic thematic map which is in use of other type of property data. However, even though the attempts to utilize the domestic thematic map are made at military sites, the study has not been conducted enough. Therefore, we defined it by matching the property data necessary for the military terrain analysis cartography and property of the domestic thematic map, and analyzed in accordance with the method to analyze the cross-country movement roads specified in FM 5-33. But, there was no data for the diameter of trees in the vegetation map among a terrain analysis map, whereas there being data for the sort of trees. As the diameter of trees can be broken through to the extent of certain diameters by tracked vehicles, they are the factors necessary in analyzing. In this study, the research was conducted focusing on calculating the diameters for some trees described in a stand yield table by using the age-class for trees in a forest floor map with a scale of 1:5000 and calculating the diameters of trees by using the diameter-class for the diameters of other trees.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}