Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human最新文献

筛选
英文 中文
Watermarking schema using an artificial immune system in spatial domain 基于空间域人工免疫系统的水印方案
O. Findik, Ismail Babaoglu, Erkan Ülker
{"title":"Watermarking schema using an artificial immune system in spatial domain","authors":"O. Findik, Ismail Babaoglu, Erkan Ülker","doi":"10.1145/1655925.1656097","DOIUrl":"https://doi.org/10.1145/1655925.1656097","url":null,"abstract":"In this paper, we propose a robust watermarking method for image copyright protection in spatial domain based on artificial immune system (AIS). Our method optimizes robustness and imperceptibility which are known to be inversely proportional to each other. The robustness of our watermark method was tested extensively against attacks by lossy JPEG compression. Performance of proposed method was evaluated by comparing with the genetic watermarking method and also the randomly chosen block based watermark method. The experiments indicate that our method is better at robustness over genetic watermarking method. We have shown that our method improves the robustness and imperceptibility comparing with the randomly chosen block based watermarking.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An empirical improvement of the accuracy of RBF networks RBF网络精度的经验改进
H. Sug
{"title":"An empirical improvement of the accuracy of RBF networks","authors":"H. Sug","doi":"10.1145/1655925.1656053","DOIUrl":"https://doi.org/10.1145/1655925.1656053","url":null,"abstract":"Neural networks have been developed for machine learning and data mining tasks, and because data mining problems contain a large amount of data, sampling is a necessity for the success of the task. Radial basis function networks are one of representative neural network algorithms, and known to have good prediction accuracy in many applications, but it is not known to decide a proper sample size like other data mining algorithms, so the task of deciding proper sample sizes for the neural networks tends to be arbitrary. As the size of samples grows, the improvement in error rates becomes better slowly. But we cannot use larger and larger samples for the networks, because there is some fluctuation in accuracy depending on the samples. This paper suggests a progressive resampling technique to cope with the situation. The suggestion is proved by experiments with very promising results.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127949056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption 乒乓mac:安全无处不在的传感器网络与认证加密
Pardeep Kumar, S. Cho, Hoon-Jae Lee
{"title":"PingPong-MAC: secure ubiquitous sensor network with authenticated encryption","authors":"Pardeep Kumar, S. Cho, Hoon-Jae Lee","doi":"10.1145/1655925.1655970","DOIUrl":"https://doi.org/10.1145/1655925.1655970","url":null,"abstract":"In this paper, we are proposing a new PingPong-MAC Authenticated Encryption scheme based on PingPong stream cipher. This newly proposed scheme fulfills the security parameters to secure data in ubiquitous sensor network. The new scheme provides data authentication, confidentiality and data integration in USN applications. The new PingPong-MAC scheme can be widely used as secure point-to-point encryption between sensor nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. The new PingPong-MAC is an ideal solution for USN and other resource-constrained devices, where the communication nodes have limited power and computational capabilities. The features of new PingPong-MAC scheme conclude that it might be more efficient than existing schemes.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile based digital contents conversion service implementation 基于移动的数字内容转换服务实现
Beom-Il Nam, B. Jeon
{"title":"Mobile based digital contents conversion service implementation","authors":"Beom-Il Nam, B. Jeon","doi":"10.1145/1655925.1656189","DOIUrl":"https://doi.org/10.1145/1655925.1656189","url":null,"abstract":"Recently, multimedia mobile service is familiar with high performance, speed and variety networking device. The purpose of this paper is to present an innovative and practical mobile service model for user interactive entertainment with mobile device and online web service. User can make video, picture, text data with cellular phone or webpage. Mobile contents creating service supports transferring contents and sharing other people from mobile to other device platform that web, iptv, phone, and so on. User, anytime, anywhere can record his life memo with cellular phone or web, that data is movie data, picture or text data. Such data transfers immediately with cellular phone camera and sharing other people. If customer changes his carriers, user cannot use previous mobile service. Integration of mobile service is required to resolve this problem. We will make basic mobile framework, and implement mobile service Integration. The purpose of this paper is implementation mobile multimedia networking service without dependency of telecom or device manufacture or service restructure.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining opinions from messenger 挖掘信使的意见
Joonsuk Ryu, Wonyoung Kim, Kyu Il Kim, U. Kim
{"title":"Mining opinions from messenger","authors":"Joonsuk Ryu, Wonyoung Kim, Kyu Il Kim, U. Kim","doi":"10.1145/1655925.1655977","DOIUrl":"https://doi.org/10.1145/1655925.1655977","url":null,"abstract":"Increasing Internet users has created enormous important information of users in Internet. Opinion mining is technology that extracts meaningful opinions from that huge information. Becoming a hot research area, opinion mining has been studied in many different ways. These studies are mostly based on reviews, blogs. However, this paper focuses on messenger which generates many messages containing opinions of users. As messages may contain many opinions unrelated to our purpose, our aim is to extract only related opinions and features. Our approach initially collects messages from messengers and employs localized linguistic technique to extract candidate messages, opinions and features. Thereafter, we extract features from candidate features using association rule mining. Finally we summarize extracted opinions and features.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling 多智能体环境下联合启发式强化学习协同大学排课
O. Yugay, Lee Tae Kyung, Franz I. S. Ko
{"title":"Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling","authors":"O. Yugay, Lee Tae Kyung, Franz I. S. Ko","doi":"10.1145/1655925.1656106","DOIUrl":"https://doi.org/10.1145/1655925.1656106","url":null,"abstract":"University timetabling is a constraint-satisfaction problem where the participants usually have conflicting requirements. Multi-agent environment can solve timetabling problem through representing each participating party with agent. We propose to apply reinforcement learning approach to coordinate agents in a university timetabling system. The system simulation is built on JADE Framework.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Converting PDF to HTML approach based on text detection 基于文本检测的PDF到HTML转换方法
Deliang Jiang, Xiaohu Yang
{"title":"Converting PDF to HTML approach based on text detection","authors":"Deliang Jiang, Xiaohu Yang","doi":"10.1145/1655925.1656103","DOIUrl":"https://doi.org/10.1145/1655925.1656103","url":null,"abstract":"Converting PDF document to HTML document with the same layout format is a very important and interesting research problem. After the conversion, it is easy for PDF document to be browsed online and information extracted. Based on the extraction result of the PDF document of the open source tool PDFBox, the paper described a method that can detect the layout information of the PDF document and convert the PDF document to HTML page effectively.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Application of intelligent agents for mobile tutoring 智能代理在移动辅导中的应用
Lavare Henry, S. Sankaranarayanan
{"title":"Application of intelligent agents for mobile tutoring","authors":"Lavare Henry, S. Sankaranarayanan","doi":"10.1145/1655925.1656100","DOIUrl":"https://doi.org/10.1145/1655925.1656100","url":null,"abstract":"We propose in this paper, that the popular e-learning process can also be pursued through the use of mobile devices, which we call as mobile learning (m-learning), another application under mobile commerce. It may be mentioned that to pursue m-learning through PDAs or mobile phones, is difficult because of their memory size being very limited and also the screen size is not that big enough to view the learning material or download them and hence we here propose considering mobile learning with Notebooks or Tablet PCs. Taking into consideration the constraints on the availability of internet connectivity and a tutor to be physically present at the other end for information dissemination, we here propose an intelligent agent replicating the tutor in the m-learning domain. The implementation of the scheme has been done using JADE development kit and the details are presented in this paper.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of effect of highway ITS incident management system 公路ITS事故管理系统的效果分析
Sunghan Lim, Hyunsuk Kim
{"title":"Analysis of effect of highway ITS incident management system","authors":"Sunghan Lim, Hyunsuk Kim","doi":"10.1145/1655925.1656140","DOIUrl":"https://doi.org/10.1145/1655925.1656140","url":null,"abstract":"In line with highway ITS infrastructure being expanded year by year, the effect of the system over the system-built section needs to be evaluated. A simulation analysis and social cost analysis were conducted in this study in an attempt to analyze the effect of incident management system. A comparison between normal situation and incident was carried out for simulation analysis and the evaluation indices such as travel time, waiting cars and accident time lasted were selected. The accident time lasted was set as 30 and 60 minutes for analysis. Consequently, both VOC and VOT were increased than normal situation and the longer the time delayed the higher the cost.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114398641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of discretization on determination of coronary artery disease using support vector machine 离散化对支持向量机冠状动脉疾病诊断的影响
Ismail Babaoglu, O. Findik, Erkan Ülker
{"title":"Effects of discretization on determination of coronary artery disease using support vector machine","authors":"Ismail Babaoglu, O. Findik, Erkan Ülker","doi":"10.1145/1655925.1656057","DOIUrl":"https://doi.org/10.1145/1655925.1656057","url":null,"abstract":"In this paper, the effect of discretization on determination of coronary artery disease using exercise stress test data by support vector machine classification method is investigated. The study dataset is obtained from cardiology department of Meram faculty of medicine including 480 patients having 23 features. Four classification models are composed. In the first model, the data is classified simply by normalizing it into [-1,1] range. In the second, third and fourth models, the data is classified by employing entropy-MDL, equal width and equal frequency discretization methods on it respectively. Support vector machine is used as the classifier for all classification models. The results show that classification performance of the model implemented by entropy-MDL discretization has the best value.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信