{"title":"Utilization of Luminance and Location for Image Identifier","authors":"Je-Ho Park, Han Auk Kim","doi":"10.1109/ICISA.2014.6847478","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847478","url":null,"abstract":"When an image identifier is generated by using luminance based method and variance in luminance domain does not exist, the generation of identifier might be failed in terms of satisfied requirements. In this paper, we present a noble identifier generation method that utilizes luminance and corresponding location in an image.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eye Detection for near Infrared Based Gaze Tracking System","authors":"Hyun-Cheol Kim, J. Cha, Won Don Lee","doi":"10.1109/ICISA.2014.6847398","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847398","url":null,"abstract":"This paper presents eye detection method for gaze tracking system using the features of eye and corneal reflection. The proposed method sequentially discards the regions that are expected not to be an eye by classifiers based on the features such as pupil intensity and appearance, corneal reflection intensity, and so on. The classifiers are designed with some empirical parameters, thus the proposed method does not need training process.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116634976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Configuration of SSD File Management","authors":"Hyuk-Kyu Lim, Je-Ho Park","doi":"10.1109/ICISA.2014.6847389","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847389","url":null,"abstract":"In this paper, we present dynamic configuration of SSD file system in order to enhance the demanded processing cost for reconfigure the memory management system. The reconfiguration of the system is achieve by observing the usage pattern of memory space. What we expect from this is to achieve effectiveness in terms of cost and resulting performance. The effect of the proposed method is experimentally evaluated and illustrated.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Z. Mas'ud, S. Sahib, M. F. Abdollah, S. R. Selamat, R. Yusof
{"title":"Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection","authors":"M. Z. Mas'ud, S. Sahib, M. F. Abdollah, S. R. Selamat, R. Yusof","doi":"10.1109/ICISA.2014.6847364","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847364","url":null,"abstract":"The proliferation of Android-based mobile devices and mobile applications in the market has triggered the malware author to make the mobile devices as the next profitable target. With user are now able to use mobile devices for various purposes such as web browsing, ubiquitous services, online banking, social networking, MMS and etc, more credential information is expose to exploitation. Applying a similar security solution that work in Desktop environment to mobile devices may not be proper as mobile devices have a limited storage, memory, CPU and power consumption. Hence, there is a need to develop a mobile malware detection that can provide an effective solution to defence the mobile user from any malicious threat and at the same time address the limitation of mobile devices environment. Prior to this matter, this research focused on evaluating the best features selection to be used in the best machine-learning classifiers. To find the best combination of both features selection and classifier, five sets of different feature selection are applies to five different machine learning classifiers. The classifier outcome is evaluated using the True Positive Rate (TPR), False Positive Rate (FPR), and Accuracy. The best combination of both features selection and classifier can be used to reduce features selection and at the same time able to classify the infected android application accurately.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121774006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Voltage-Frequency Island Aware Power-Efficient NoC through Slack Optimization","authors":"Junhui Wang, Yue Qian, Jia Lu, Baoliang Li, Ming Zhu, Wenhua Dou","doi":"10.1109/ICISA.2014.6847386","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847386","url":null,"abstract":"In network-on-chips (NoCs), power consumption has become the main design constraint. In this paper, we propose a power-efficient network calculus-based (PNC) method to minimize the power consumption of NoC. Based on the slack that a packet can be further delayed in the network without violating its deadline, Our PNC method uses power-gating technique to reduce the active buffer size and uses voltage-frequency scaling technique to reduce the voltage-frequency of each voltage-frequency island. With less active buffer units and lower voltage- frequency, the power consumption of NoC is reduced. Experimental results show that our PNC method can save at most 50% of the total power consumption.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polynomial Model of the Inverse Plant ILC Algorithm","authors":"M. Songjun","doi":"10.1109/ICISA.2014.6847447","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847447","url":null,"abstract":"In this paper the new iterative learning control algorithm is proposed and its properties are derived. An important characteristic of the algorithm is that they use the polynomial representations of the inverse plant G to construct the new control law. The approach is based on the parameter optimization through a quadratic performance index which its solution will convert in norm to zero. It is capable to produce an improvement to the convergence rate. As the number of polynomial term increases, faster convergence rate is accomplished and the ideal plant inverse algorithm is approached. A comparison between the proposed algorithm and the inverse type parameter optimal ILC is also presented based significantly on the convergence rate.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Measuring the R&D Projects Similarity Using Patent Information","authors":"Jong-bae Kim, JungWon Byun","doi":"10.1109/ICISA.2014.6847333","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847333","url":null,"abstract":"It is important to analyze the similarity of R&D projects for efficient investments of government's budgets. In this study, we represent the methods of analyzing the similarity between R&D projects using patent information. For this, we propose a model for similarity measurement based on the set theories and probability theory.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method to Measure the Efficiency of Phishing Emails Detection Features","authors":"Melad Mohamed Al-Daeef, N. Basir, M. Saudi","doi":"10.1109/ICISA.2014.6847332","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847332","url":null,"abstract":"Phishing is a threat in which users are sent fake emails that urge them to click a link (URL) which takes to a phisher's website. At that site, users' accounts information could be lost. Many technical and non-technical solutions have been proposed to fight phishing attacks. To stop such attacks, it is important to select the correct feature(s) to detect phishing emails. Thus, the current work presents a new method to selecting more efficient feature in detecting phishing emails. Best features can be extracted from email's body (content) part. Keywords and URLs are known features that can be extracted from email's body part. These two features are very relevant to the three general aspects of email, these aspects are, email's sender, email's content, and email's receiver. In this work, three effectiveness criteria were derived based on these aspects of email. Such criteria were used to evaluate the efficiency of Keywords and URLs features in detecting phishing emails by measuring their Effectiveness Metric (EM) values. The experimental results obtained from analyzing more than 8000 ham (legitimate) and phishing emails from two different datasets show that, relying upon the URLs feature in detecting phishing emails will predominantly give more precise results than relying upon the Keywords feature in a such task.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Traffic Congestion Using Simulation Software","authors":"Seongho Kim, W. Suh","doi":"10.1109/ICISA.2014.6847430","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847430","url":null,"abstract":"Traffic simulations are being increasingly utilized as transportation systems have become more complex and congested. However, most simulation models have limitations in overcapacity demand conditions. When traffic in a congested area \"fills\" the available roadway space additional traffic demand may never be allowed to enter the network. The intent of this paper is to explore one possible means to address the issue of unserved vehicles in overcapacity conditions using the VISSIM trip chain. The VISSIM trip chain feature is used for this analysis as it has the advantage of not eliminating a vehicle when congestion hinders its entrance onto a network, instead holding the vehicle until an acceptable gap exists on the entry link. A sample network is built to investigate the difference between standard traffic flow inputs and the trip chain method in overcapacity conditions. Also, simulations with different minimum space headway parameters in the priority rules are analyzed, allowing for an initial investigation into the sensitivity of the model to this parameter. Based on the analysis conducted it is concluded that, with appropriate calibrations, the trip chain feature in VISSIM is a potentially useful method to provide realistic modeling of various overcapacity conditions.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Simulation Software: Traffic Flow Characteristics in CORSIM","authors":"Seongho Kim, W. Suh, Jungin Kim","doi":"10.1109/ICISA.2014.6847475","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847475","url":null,"abstract":"CORSIM short for corridor simulation was developed and is maintained by the Federal Highway Administration. It is a microscopic simulation model designed for the analysis of freeways, urban streets, and corridors or networks. The model includes two predecessor models: FRESIM and NETSIM. FRESIM is a microscopic model of freeway traffic, and NETSIM is a model of urban street traffic. CORSIM has a capability simulating a wide range of traffic flow conditions. It is run within a software environment called the Traffic Software Integrated System (TSIS), which provides an integrated, Windows-based interface and environment for executing the model. A key element of TSIS is the TRAFVU output processor, which allows the analyst to view the network graphically and assess its performance using animation. CORSIM is a microscopic simulation model that tracks the position and movement of each vehicle in the network once each second. The purpose of this study is to investigate traffic flow characteristics under \"breakdown and recovery condition\" through literature reviews and testing such characteristics in CORSIM.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"237 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121164593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}