{"title":"A public key based PMIPv6 authentication scheme","authors":"Jaehyu Kim, Joo-Seok Song","doi":"10.1109/ICIS.2014.6912098","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912098","url":null,"abstract":"With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chinese tag analysis for foreign movie contents","authors":"Xiao Lin, E. Ito, S. Hirokawa","doi":"10.1109/ICIS.2014.6912126","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912126","url":null,"abstract":"Consumer Generated Media (CGM) is gaining huge popularity. The authors are particularly interested in the intercultural comprehension of movie contents made in foreign countries. This paper focuses on the website bilibili.tv as a test case to analyze how Japanese movie contents are watched in China. The authors analyze all tags and how foreign tags are introduced and translated into Chinese. They propose a simple statistical method to identify whether a word is a loanword or not, if the word is represented by Chinese characters. They also analyze the trends of tags in bilibili.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashwin Kumar T K, Jongyeop Kim, K M George, N. Park
{"title":"Dynamic data rebalancing in Hadoop","authors":"Ashwin Kumar T K, Jongyeop Kim, K M George, N. Park","doi":"10.1109/ICIS.2014.6912153","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912153","url":null,"abstract":"Current implementation of Hadoop is based on an assumption that all the nodes in a Hadoop cluster are homogenous. Data in a Hadoop cluster is split into blocks and are replicated based on the replication factor. Service time for jobs that accesses data stored in Hadoop considerably increases when the number of jobs is greater than the number of copies of data and when the nodes in Hadoop cluster differ much in their processing capabilities. This paper addresses dynamic data rebalancing in a heterogeneous Hadoop cluster. Data rebalancing is done by replicating data dynamically with minimum data movement cost based on the number of incoming parallel mapreduce jobs. Our experiments indicate that as a result of dynamic data rebalancing service time of mapreduce jobs were reduced by over 30% and resource utilization is increased by over 50% when compared against Hadoop.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hadj Ahmed Bouarara, Amine Rahmani, R. M. Hamou, Abdelmalek Amine
{"title":"Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service","authors":"Hadj Ahmed Bouarara, Amine Rahmani, R. M. Hamou, Abdelmalek Amine","doi":"10.1109/ICIS.2014.6912125","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912125","url":null,"abstract":"One of the most modern problems that computer science try to resolve is the plagiarism, in this article we present a new approach for automatic plagiarism detection in world of mail service. Our system is based on the n-gram character for the representation of the texts and tfidf as weighting to calculate the importance of term in the corpus, we use also a combination between the machine learning methods as a way to detect if a document is plagiarized or not, we use pan 09 corpus for the construction and evaluation of the prediction model then we simulate a meta-heuristic method based on genetic algorithms with a variations of parameters to know if it can improve the results. The main objective of our work is to protect intellectual property and improve the efficiency of plagiarism detection system.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on energy management in data center","authors":"Sujie He, Chunlin Li","doi":"10.1109/ICIS.2014.6912101","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912101","url":null,"abstract":"The explosive growth of cloud computing technology, accompanied with the wide spread use of virtualization technology has brought data centers major problems such as power or energy consumption. with these problems beside, It is imminent to take measures to do energy saving work. In this paper, we'll present some recent researches on power/energy management and analyze some strategies of energy saving.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based mobile application testing","authors":"Logeshwaran Murugesan, Prakash Balasubramanian","doi":"10.1109/ICIS.2014.6912148","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912148","url":null,"abstract":"The testing of a mobile application is a difficult task keeping in mind the diversity in mobile devices and the runtime environment. Also the need of resources to test a mobile application varies from mobile phones to tablet. At present there are tools which can simulate the mobile environment to test mobile applications. These stimulators simulate only the functionality of a particular operating system but not the processor cores, speed, memory, cache size of the mobile device. In order to overcome the above short comings we move to cloud testing. In cloud computing we can easily allocate the required resources using virtualization and also it is easy to scale up our resources anytime without affecting the entire system. The major advantage in cloud is that it is cost-effective. In this paper we define a cloud based mobile testing model which can test application for different mobile environments and platforms.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed detection on holes of component based on multi-view projection","authors":"Zhiqiang Wang, Jinxiao Pan, Bin Liu, Ping Chen","doi":"10.1109/ICIS.2014.6912130","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912130","url":null,"abstract":"In the process of X-ray digital imaging detection, previous test usually adopts the projection data of 360° to reconstruct. But in practical test, it's often restricted to the installation of the equipment and the cost, so it cannot meet the condition of reconstruction. This paper studies a method to solve the coordinate of circle center about a particular component by some experience information, which is based on the projection values of three views in order to determine the distribution of holes. Experiment shows that the method not only reduces the collection angles and the cost, which satisfies the problem of detection in practical application, but also guarantees the accuracy of the positional information of the internal holes, which is compared with the 900 views under reconstruction.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116310148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise robust tamil speech word recognition system by means of PAC features with ANFIS","authors":"S. Rojathai, M. Venkatesulu","doi":"10.1109/ICIS.2014.6912173","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912173","url":null,"abstract":"In the prior (earlier) speech word recognition system, the speech words are recognized from the input speech words using ANFIS. But this method performance has to be improved in terms of their accuracy and noise robust of the speech recognition. To improve the performance a new Tamil speech word recognition system is proposed with Phase Autocorrelation (PAC). In our proposed system, PAC features are extracted from the input speech word signals. In PAC the features are extracted from the PAC spectrum are called PAC features. The extracted features from the PAC spectrum are Energy entropy, Zero crossing rate and short time energy. Afterward, the extracted PAC features from the feature extraction phase are given to the recognition. In recognition, an ANFIS system is utilized to check whether the input Tamil speech words are recognized or unrecognized. In word recognition, the ANFIS system is well trained by the features from feature extraction process and the recognition performance is validated by utilizing a set of testing speech words. The implementation and the comparison result shows that our proposed system has given high recognition rate in different noise levels.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The optimization of weights in weighted hybrid recommendation algorithm","authors":"Wen-Hu Lin, Ying Li, Shuang Feng, Yongbin Wang","doi":"10.1109/ICIS.2014.6912169","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912169","url":null,"abstract":"In the field of recommender systems, the performance of every single recommendation algorithm is limited and each has its own strengths and weaknesses, so more attentions are paid to the hybrid recommendation algorithms. There are various hybridization strategies, this paper is focused on the weighted hybridization. In the weighted hybridization, researchers are always stumped by a problem -how to optimize the weights of each algorithm. When the number of algorithms of the weighted hybridization is less then 3, then we can fine tune the weight through repeating experiment, but when the number is more then 3, it is hard to get the weights through the same method. And that is what is addressed by this paper.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A block cipher based on Boolean matrices using bit level operations","authors":"P. VidhyaSaraswathi, M. Venkatesulu","doi":"10.1109/ICIS.2014.6912108","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912108","url":null,"abstract":"The security of multimedia data especially in video on demand and video conferencing applications are more important over networks. Traditional algorithms like DES, AES and IDEA are not suitable for real time applications because of large data size. From the process architecture view point, the bit level operations have ability to design very fast encryption algorithms and to secure next generation multimedia processing. This paper proposes a block cipher based on Boolean matrix theory and bit level permutation operations. The cipher is so designed that it can be implemented in hardware and software.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}