2014 International Conference on Information Science & Applications (ICISA)最新文献

筛选
英文 中文
Utilization of Luminance and Location for Image Identifier 亮度和位置在图像识别中的应用
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847478
Je-Ho Park, Han Auk Kim
{"title":"Utilization of Luminance and Location for Image Identifier","authors":"Je-Ho Park, Han Auk Kim","doi":"10.1109/ICISA.2014.6847478","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847478","url":null,"abstract":"When an image identifier is generated by using luminance based method and variance in luminance domain does not exist, the generation of identifier might be failed in terms of satisfied requirements. In this paper, we present a noble identifier generation method that utilizes luminance and corresponding location in an image.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Eye Detection for near Infrared Based Gaze Tracking System 基于近红外注视跟踪系统的眼部检测
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847398
Hyun-Cheol Kim, J. Cha, Won Don Lee
{"title":"Eye Detection for near Infrared Based Gaze Tracking System","authors":"Hyun-Cheol Kim, J. Cha, Won Don Lee","doi":"10.1109/ICISA.2014.6847398","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847398","url":null,"abstract":"This paper presents eye detection method for gaze tracking system using the features of eye and corneal reflection. The proposed method sequentially discards the regions that are expected not to be an eye by classifiers based on the features such as pupil intensity and appearance, corneal reflection intensity, and so on. The classifiers are designed with some empirical parameters, thus the proposed method does not need training process.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116634976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Configuration of SSD File Management SSD文件管理动态配置
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847389
Hyuk-Kyu Lim, Je-Ho Park
{"title":"Dynamic Configuration of SSD File Management","authors":"Hyuk-Kyu Lim, Je-Ho Park","doi":"10.1109/ICISA.2014.6847389","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847389","url":null,"abstract":"In this paper, we present dynamic configuration of SSD file system in order to enhance the demanded processing cost for reconfigure the memory management system. The reconfiguration of the system is achieve by observing the usage pattern of memory space. What we expect from this is to achieve effectiveness in terms of cost and resulting performance. The effect of the proposed method is experimentally evaluated and illustrated.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection Android恶意软件检测中的特征选择与机器学习分类器分析
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847364
M. Z. Mas'ud, S. Sahib, M. F. Abdollah, S. R. Selamat, R. Yusof
{"title":"Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection","authors":"M. Z. Mas'ud, S. Sahib, M. F. Abdollah, S. R. Selamat, R. Yusof","doi":"10.1109/ICISA.2014.6847364","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847364","url":null,"abstract":"The proliferation of Android-based mobile devices and mobile applications in the market has triggered the malware author to make the mobile devices as the next profitable target. With user are now able to use mobile devices for various purposes such as web browsing, ubiquitous services, online banking, social networking, MMS and etc, more credential information is expose to exploitation. Applying a similar security solution that work in Desktop environment to mobile devices may not be proper as mobile devices have a limited storage, memory, CPU and power consumption. Hence, there is a need to develop a mobile malware detection that can provide an effective solution to defence the mobile user from any malicious threat and at the same time address the limitation of mobile devices environment. Prior to this matter, this research focused on evaluating the best features selection to be used in the best machine-learning classifiers. To find the best combination of both features selection and classifier, five sets of different feature selection are applies to five different machine learning classifiers. The classifier outcome is evaluated using the True Positive Rate (TPR), False Positive Rate (FPR), and Accuracy. The best combination of both features selection and classifier can be used to reduce features selection and at the same time able to classify the infected android application accurately.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121774006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Designing Voltage-Frequency Island Aware Power-Efficient NoC through Slack Optimization 基于Slack优化设计电压频率岛感知的节能NoC
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847386
Junhui Wang, Yue Qian, Jia Lu, Baoliang Li, Ming Zhu, Wenhua Dou
{"title":"Designing Voltage-Frequency Island Aware Power-Efficient NoC through Slack Optimization","authors":"Junhui Wang, Yue Qian, Jia Lu, Baoliang Li, Ming Zhu, Wenhua Dou","doi":"10.1109/ICISA.2014.6847386","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847386","url":null,"abstract":"In network-on-chips (NoCs), power consumption has become the main design constraint. In this paper, we propose a power-efficient network calculus-based (PNC) method to minimize the power consumption of NoC. Based on the slack that a packet can be further delayed in the network without violating its deadline, Our PNC method uses power-gating technique to reduce the active buffer size and uses voltage-frequency scaling technique to reduce the voltage-frequency of each voltage-frequency island. With less active buffer units and lower voltage- frequency, the power consumption of NoC is reduced. Experimental results show that our PNC method can save at most 50% of the total power consumption.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Polynomial Model of the Inverse Plant ILC Algorithm 逆植物ILC算法的多项式模型
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847447
M. Songjun
{"title":"Polynomial Model of the Inverse Plant ILC Algorithm","authors":"M. Songjun","doi":"10.1109/ICISA.2014.6847447","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847447","url":null,"abstract":"In this paper the new iterative learning control algorithm is proposed and its properties are derived. An important characteristic of the algorithm is that they use the polynomial representations of the inverse plant G to construct the new control law. The approach is based on the parameter optimization through a quadratic performance index which its solution will convert in norm to zero. It is capable to produce an improvement to the convergence rate. As the number of polynomial term increases, faster convergence rate is accomplished and the ideal plant inverse algorithm is approached. A comparison between the proposed algorithm and the inverse type parameter optimal ILC is also presented based significantly on the convergence rate.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model for Measuring the R&D Projects Similarity Using Patent Information 基于专利信息的研发项目相似度度量模型
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847333
Jong-bae Kim, JungWon Byun
{"title":"A Model for Measuring the R&D Projects Similarity Using Patent Information","authors":"Jong-bae Kim, JungWon Byun","doi":"10.1109/ICISA.2014.6847333","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847333","url":null,"abstract":"It is important to analyze the similarity of R&D projects for efficient investments of government's budgets. In this study, we represent the methods of analyzing the similarity between R&D projects using patent information. For this, we propose a model for similarity measurement based on the set theories and probability theory.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method to Measure the Efficiency of Phishing Emails Detection Features 一种衡量钓鱼邮件检测特征效率的方法
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847332
Melad Mohamed Al-Daeef, N. Basir, M. Saudi
{"title":"A Method to Measure the Efficiency of Phishing Emails Detection Features","authors":"Melad Mohamed Al-Daeef, N. Basir, M. Saudi","doi":"10.1109/ICISA.2014.6847332","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847332","url":null,"abstract":"Phishing is a threat in which users are sent fake emails that urge them to click a link (URL) which takes to a phisher's website. At that site, users' accounts information could be lost. Many technical and non-technical solutions have been proposed to fight phishing attacks. To stop such attacks, it is important to select the correct feature(s) to detect phishing emails. Thus, the current work presents a new method to selecting more efficient feature in detecting phishing emails. Best features can be extracted from email's body (content) part. Keywords and URLs are known features that can be extracted from email's body part. These two features are very relevant to the three general aspects of email, these aspects are, email's sender, email's content, and email's receiver. In this work, three effectiveness criteria were derived based on these aspects of email. Such criteria were used to evaluate the efficiency of Keywords and URLs features in detecting phishing emails by measuring their Effectiveness Metric (EM) values. The experimental results obtained from analyzing more than 8000 ham (legitimate) and phishing emails from two different datasets show that, relying upon the URLs feature in detecting phishing emails will predominantly give more precise results than relying upon the Keywords feature in a such task.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling Traffic Congestion Using Simulation Software 利用仿真软件建模交通拥堵
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847430
Seongho Kim, W. Suh
{"title":"Modeling Traffic Congestion Using Simulation Software","authors":"Seongho Kim, W. Suh","doi":"10.1109/ICISA.2014.6847430","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847430","url":null,"abstract":"Traffic simulations are being increasingly utilized as transportation systems have become more complex and congested. However, most simulation models have limitations in overcapacity demand conditions. When traffic in a congested area \"fills\" the available roadway space additional traffic demand may never be allowed to enter the network. The intent of this paper is to explore one possible means to address the issue of unserved vehicles in overcapacity conditions using the VISSIM trip chain. The VISSIM trip chain feature is used for this analysis as it has the advantage of not eliminating a vehicle when congestion hinders its entrance onto a network, instead holding the vehicle until an acceptable gap exists on the entry link. A sample network is built to investigate the difference between standard traffic flow inputs and the trip chain method in overcapacity conditions. Also, simulations with different minimum space headway parameters in the priority rules are analyzed, allowing for an initial investigation into the sensitivity of the model to this parameter. Based on the analysis conducted it is concluded that, with appropriate calibrations, the trip chain feature in VISSIM is a potentially useful method to provide realistic modeling of various overcapacity conditions.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traffic Simulation Software: Traffic Flow Characteristics in CORSIM 交通仿真软件:CORSIM中的交通流特性
2014 International Conference on Information Science & Applications (ICISA) Pub Date : 2014-05-06 DOI: 10.1109/ICISA.2014.6847475
Seongho Kim, W. Suh, Jungin Kim
{"title":"Traffic Simulation Software: Traffic Flow Characteristics in CORSIM","authors":"Seongho Kim, W. Suh, Jungin Kim","doi":"10.1109/ICISA.2014.6847475","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847475","url":null,"abstract":"CORSIM short for corridor simulation was developed and is maintained by the Federal Highway Administration. It is a microscopic simulation model designed for the analysis of freeways, urban streets, and corridors or networks. The model includes two predecessor models: FRESIM and NETSIM. FRESIM is a microscopic model of freeway traffic, and NETSIM is a model of urban street traffic. CORSIM has a capability simulating a wide range of traffic flow conditions. It is run within a software environment called the Traffic Software Integrated System (TSIS), which provides an integrated, Windows-based interface and environment for executing the model. A key element of TSIS is the TRAFVU output processor, which allows the analyst to view the network graphically and assess its performance using animation. CORSIM is a microscopic simulation model that tracks the position and movement of each vehicle in the network once each second. The purpose of this study is to investigate traffic flow characteristics under \"breakdown and recovery condition\" through literature reviews and testing such characteristics in CORSIM.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"237 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121164593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信