{"title":"A study of correlation between transitions and sound effects in a fairy tale movie","authors":"Aika Mukai, Toshiyuki Yamamoto, M. Hirayama","doi":"10.1145/1655925.1655928","DOIUrl":"https://doi.org/10.1145/1655925.1655928","url":null,"abstract":"In this study, it was tested that types of transitional motion patterns and transitional semantics were strongly correlated and that types of transitional patterns and sound effects were also related. The goal of this research was to approach this topic theoretically, based on the assumption that each transitional motion pattern tends to have its own semantic content and also that the transitional motion pattern and some sound effects were correlated. In order to test our hypotheses, a fairy tale, \"Momotaro\", or Peach Boy, was employed, the story line of which is familiar to all Japanese. The story was segmented by scenes, according to meaningful story chunks. Each scene chunk was linked to one another with one of the transitions, which were classified into four patterns. It was tested in experiments that there was any theoretical foundation between the transitional motion patterns and the semantics of conjunctions.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering","authors":"Chao-Fan Dai, Mingli Wang","doi":"10.1145/1655925.1656193","DOIUrl":"https://doi.org/10.1145/1655925.1656193","url":null,"abstract":"Requirement Elicitation and negotiation is a collaborative process and the involved multiple stakeholders have to communicate their needs, expertise, and experiences. The ultimate quality of the requirement is greatly constrained by participation and communication of multiple stakeholders. The Hall for Workshop of Meta-Synthetic Engineering is a web-based group support system, which provides a flexible platform for asynchronous and synchronous collaboration, knowledge creation and wisdom emergence for creative solutions of unstructured complex issues. To motivate and facilitate the active participation and communication of stakeholders, the paper try to combine he principal of meta-synthesis from qualitative to quantitative with WinWin and explore how to effectively facilitate requirement elicitation and negotiation process in geographically disperse.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128743940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PhraseRank for document clustering: reweighting the weight of phrase","authors":"Yoon-Ho Cho, Sang-Hyun Park, SangKeun Lee","doi":"10.1145/1655925.1655956","DOIUrl":"https://doi.org/10.1145/1655925.1655956","url":null,"abstract":"Given a document collection, a hierarchical clustering algorithm groups several clusters. Recent works have identified the set of overlap phrases as useful features in hierarchical document clustering. However, they did not consider the relationship between co-occurred overlap phrases in a document and degrees of opposite relationships between overlap phrases. In this paper, we propose new algorithms for effective similarity measure before working hierarchical clustering algorithm. There are two important features in the proposed methods: the ranking list of top-k phrases for each particular overlap phrase and the opposite significances between two overlap phrases with each other. Experiment result shows that proposed method improves the results of clustering.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers","authors":"Li Xia, Zhong Cheng, Qu Zeng-Yan","doi":"10.1145/1655925.1656079","DOIUrl":"https://doi.org/10.1145/1655925.1656079","url":null,"abstract":"By allowing the overlap execution of computation and communication, a multi-round algorithm with inter-node scheduling and intra-node scheduling for divisible loads is presented on the heterogeneous cluster systems of multi-core computers, which have different number of processing cores and distinct computation, communication and memory abilities. The presented inter-node scheduling can accommodate dynamicaly the surplus of the remaining available memory of nodes in each round scheduling, and the intra-node scheduling can efficiently make use of the characterictics of multi-core machines and the shared L2 cache to reduce the required time to access memory. The experiment results with different tests and several parameters on a heterogeneous cluster system with multi-core computers show that the presented algorithm can obtain better scheduling performance and reduce significantly the total scheduling length, and it can schedule more large-scale applications than the existing scheduling scheme.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wavelet based method for detecting and localizing epileptic neural spikes in EEG","authors":"B. Abibullaev, H. Seo, Won-Seok Kang, J. An","doi":"10.1145/1655925.1656052","DOIUrl":"https://doi.org/10.1145/1655925.1656052","url":null,"abstract":"The recording of seizures is of primary interest in the evaluation of epileptic transients. Seizure is the phenomenon of rhythmicity discharge from either a local area or the whole brain and the individual behaviour usually lasts from seconds to minutes. Since seizures in general occur infrequently and unpredictably, an automatic detection of seizures during long-term electroencephalograph (EEG) recordings is highly recommended. As EEG signals are nonstationary, the conventional methods of frequency analysis are not successful for diagnostic purposes. This paper proposes a new method for the detection of epileptic transients in EEG by using continuous wavelet transform (CWT) with suitable mother wavelet functions and thresholding method. We demonstrate the efficiency of our method on data to identify and clearly locate in time the seizure activities. The method is superior both in separation from noise and in identifying superimposed epileptic action potentials based on in sets of combined scales. We prove that this method is fast and simple which also reduces real time computations.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130381060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem","authors":"Tomohiro Shintani, R. Sakai","doi":"10.1145/1655925.1662667","DOIUrl":"https://doi.org/10.1145/1655925.1662667","url":null,"abstract":"This paper describes details of procedure for breaking a product sum or subset sum public key cryptosystem with two blocks of cipher text which has a random sequence in the message. This attack can successfully break some small examples of this cryptosystem. These examples may be not too small to evaluate the system.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-aware customization e-learning system with intelligent on-line examination mechanism","authors":"Yao Chin-bang","doi":"10.1145/1655925.1656017","DOIUrl":"https://doi.org/10.1145/1655925.1656017","url":null,"abstract":"With the fast development of distributed network technology and speeding increase of network bandwidth, it has now become one of the hottest issues as how network can be used to enrich the living quality of people. This paper will focus on the e-learning and On-line examination domain, and would like to make use diverse functions of Multi-agent as found in every Distributed Database or AP Server, and through the Data Mining technology to arrange the latest learning procedure and test recording of each learner. And after analysis, the results will be provided to the Recommending Learning AP Server as the suitable level of customization learning program suggested to learning under current level based upon system evaluation. Thus, learner can enjoy the fun of learning with sequential progress. Moreover, we have resorted to the technology of various Agents, and recorded the information of browsing and learning processes of learner in every stage, and it would then arrange and organize possible current level of learning for among learners from Database and Data Warehouse so as to provide learners to conduct judgment as they choose degree of difficulty with test-paper for online test, achieving the objective of integrate learning and test. Hence, it can efficiently improve defects of traditional e-learning and online test. At the end, we have put forth Context-aware technology to integrate intelligent online examination system so as to achieve the relevant learning content of students for extension as well as mastery of teacher for learning extent of students. Then, it can have designed the test that accommodates to student's level so that online test and learning can be complementary, helping examination to return to its original essence-appreciation of self and turning learning to be extended indefinitely.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bionic gait programming algorithm for hexapod robot","authors":"X. Lv, Yongxin Liu","doi":"10.1145/1655925.1656138","DOIUrl":"https://doi.org/10.1145/1655925.1656138","url":null,"abstract":"The gait movement mechanism of hexapod robot with 18-DOF (degree of freedom) is analyzed in this paper. Mainly focus on the robot walking process, it is analyzed that the kinematics characteristics, static stability, walking in straight line using tripod gait, turning gait around fixed-point and the basis for tracking select of foot-point. According to these investigations above, the joint angles control arithmetic is designed, and the algorithm has been transplanted into a single chip computer control system. This control algorithm for hexapod robot has been proved correctness and effectiveness by the experiment results.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of malicious peers in a gossip-based reputation system","authors":"V. Carchiolo, A. Longheu, M. Malgeri, G. Mangioni","doi":"10.1145/1655925.1655961","DOIUrl":"https://doi.org/10.1145/1655925.1655961","url":null,"abstract":"Users trust management is one of the most important issues in the Internet. In fact, due to the distributed nature of many services it is not simple to assign an objective trust value to a user, especially in the presence of groups of malicious peers. In this paper we analyze the effect of group empowering on a gossip-based reputation system named GossipTrust. In particular, we show the GossipTrust immunity to a single growing group of malicious users and to a growing number of pairs of malicious users.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on consumer demands and merchant participation motives of mobile payment services in China","authors":"Xinyan Zhao, Ge Wei, Tingjie Lu","doi":"10.1145/1655925.1655969","DOIUrl":"https://doi.org/10.1145/1655925.1655969","url":null,"abstract":"Consumer demands and merchant participation motives are the two key factors of the mobile payment service market from the point of view of mobile payment service providers to whom both are customers. To find out the real attitudes of mobile users and merchants, qualitative and quantitative investigation are made in 5 provinces in China covering 6 typical application fields of mobile payment services. The results showed that mobile users have strong adoptive intention of the service in all areas investigated, and the main characteristics they are concerning about the service are ease of use, security, time saving and convenience of handling in all the areas. And also consumers show their special concern or interests in different areas. For motives of merchants, two different attitudes are found: the commercial companies such as the online e-commerce companies, the off-line fast food shops and convenience stores show a positive interest towards the services and except more relevant value added services from the mobile payment service providers; while the public utilities agencies and monopoly companies such as the water corporations, gas companies and the bus companies are not active. In addition, more detailed information of the target customers and their expectations of mobile payment services are analyzed through quantitative analysis.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121478887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}