2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
A public key based PMIPv6 authentication scheme 一个基于公钥的PMIPv6认证方案
Jaehyu Kim, Joo-Seok Song
{"title":"A public key based PMIPv6 authentication scheme","authors":"Jaehyu Kim, Joo-Seok Song","doi":"10.1109/ICIS.2014.6912098","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912098","url":null,"abstract":"With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Chinese tag analysis for foreign movie contents 国外电影内容的中文标签分析
Xiao Lin, E. Ito, S. Hirokawa
{"title":"Chinese tag analysis for foreign movie contents","authors":"Xiao Lin, E. Ito, S. Hirokawa","doi":"10.1109/ICIS.2014.6912126","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912126","url":null,"abstract":"Consumer Generated Media (CGM) is gaining huge popularity. The authors are particularly interested in the intercultural comprehension of movie contents made in foreign countries. This paper focuses on the website bilibili.tv as a test case to analyze how Japanese movie contents are watched in China. The authors analyze all tags and how foreign tags are introduced and translated into Chinese. They propose a simple statistical method to identify whether a word is a loanword or not, if the word is represented by Chinese characters. They also analyze the trends of tags in bilibili.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic data rebalancing in Hadoop Hadoop中的动态数据再平衡
Ashwin Kumar T K, Jongyeop Kim, K M George, N. Park
{"title":"Dynamic data rebalancing in Hadoop","authors":"Ashwin Kumar T K, Jongyeop Kim, K M George, N. Park","doi":"10.1109/ICIS.2014.6912153","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912153","url":null,"abstract":"Current implementation of Hadoop is based on an assumption that all the nodes in a Hadoop cluster are homogenous. Data in a Hadoop cluster is split into blocks and are replicated based on the replication factor. Service time for jobs that accesses data stored in Hadoop considerably increases when the number of jobs is greater than the number of copies of data and when the nodes in Hadoop cluster differ much in their processing capabilities. This paper addresses dynamic data rebalancing in a heterogeneous Hadoop cluster. Data rebalancing is done by replicating data dynamically with minimum data movement cost based on the number of incoming parallel mapreduce jobs. Our experiments indicate that as a result of dynamic data rebalancing service time of mapreduce jobs were reduced by over 30% and resource utilization is increased by over 50% when compared against Hadoop.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service 基于遗传算法的邮件剽窃检测机器学习工具和元启发式算法
Hadj Ahmed Bouarara, Amine Rahmani, R. M. Hamou, Abdelmalek Amine
{"title":"Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service","authors":"Hadj Ahmed Bouarara, Amine Rahmani, R. M. Hamou, Abdelmalek Amine","doi":"10.1109/ICIS.2014.6912125","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912125","url":null,"abstract":"One of the most modern problems that computer science try to resolve is the plagiarism, in this article we present a new approach for automatic plagiarism detection in world of mail service. Our system is based on the n-gram character for the representation of the texts and tfidf as weighting to calculate the importance of term in the corpus, we use also a combination between the machine learning methods as a way to detect if a document is plagiarized or not, we use pan 09 corpus for the construction and evaluation of the prediction model then we simulate a meta-heuristic method based on genetic algorithms with a variations of parameters to know if it can improve the results. The main objective of our work is to protect intellectual property and improve the efficiency of plagiarism detection system.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on energy management in data center 数据中心能源管理研究
Sujie He, Chunlin Li
{"title":"Research on energy management in data center","authors":"Sujie He, Chunlin Li","doi":"10.1109/ICIS.2014.6912101","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912101","url":null,"abstract":"The explosive growth of cloud computing technology, accompanied with the wide spread use of virtualization technology has brought data centers major problems such as power or energy consumption. with these problems beside, It is imminent to take measures to do energy saving work. In this paper, we'll present some recent researches on power/energy management and analyze some strategies of energy saving.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud based mobile application testing 基于云的移动应用程序测试
Logeshwaran Murugesan, Prakash Balasubramanian
{"title":"Cloud based mobile application testing","authors":"Logeshwaran Murugesan, Prakash Balasubramanian","doi":"10.1109/ICIS.2014.6912148","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912148","url":null,"abstract":"The testing of a mobile application is a difficult task keeping in mind the diversity in mobile devices and the runtime environment. Also the need of resources to test a mobile application varies from mobile phones to tablet. At present there are tools which can simulate the mobile environment to test mobile applications. These stimulators simulate only the functionality of a particular operating system but not the processor cores, speed, memory, cache size of the mobile device. In order to overcome the above short comings we move to cloud testing. In cloud computing we can easily allocate the required resources using virtualization and also it is easy to scale up our resources anytime without affecting the entire system. The major advantage in cloud is that it is cost-effective. In this paper we define a cloud based mobile testing model which can test application for different mobile environments and platforms.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed detection on holes of component based on multi-view projection 基于多视图投影的构件孔洞分布检测
Zhiqiang Wang, Jinxiao Pan, Bin Liu, Ping Chen
{"title":"Distributed detection on holes of component based on multi-view projection","authors":"Zhiqiang Wang, Jinxiao Pan, Bin Liu, Ping Chen","doi":"10.1109/ICIS.2014.6912130","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912130","url":null,"abstract":"In the process of X-ray digital imaging detection, previous test usually adopts the projection data of 360° to reconstruct. But in practical test, it's often restricted to the installation of the equipment and the cost, so it cannot meet the condition of reconstruction. This paper studies a method to solve the coordinate of circle center about a particular component by some experience information, which is based on the projection values of three views in order to determine the distribution of holes. Experiment shows that the method not only reduces the collection angles and the cost, which satisfies the problem of detection in practical application, but also guarantees the accuracy of the positional information of the internal holes, which is compared with the 900 views under reconstruction.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116310148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise robust tamil speech word recognition system by means of PAC features with ANFIS 基于PAC特征和ANFIS的噪声鲁棒泰米尔语单词识别系统
S. Rojathai, M. Venkatesulu
{"title":"Noise robust tamil speech word recognition system by means of PAC features with ANFIS","authors":"S. Rojathai, M. Venkatesulu","doi":"10.1109/ICIS.2014.6912173","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912173","url":null,"abstract":"In the prior (earlier) speech word recognition system, the speech words are recognized from the input speech words using ANFIS. But this method performance has to be improved in terms of their accuracy and noise robust of the speech recognition. To improve the performance a new Tamil speech word recognition system is proposed with Phase Autocorrelation (PAC). In our proposed system, PAC features are extracted from the input speech word signals. In PAC the features are extracted from the PAC spectrum are called PAC features. The extracted features from the PAC spectrum are Energy entropy, Zero crossing rate and short time energy. Afterward, the extracted PAC features from the feature extraction phase are given to the recognition. In recognition, an ANFIS system is utilized to check whether the input Tamil speech words are recognized or unrecognized. In word recognition, the ANFIS system is well trained by the features from feature extraction process and the recognition performance is validated by utilizing a set of testing speech words. The implementation and the comparison result shows that our proposed system has given high recognition rate in different noise levels.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The optimization of weights in weighted hybrid recommendation algorithm 加权混合推荐算法中权重的优化
Wen-Hu Lin, Ying Li, Shuang Feng, Yongbin Wang
{"title":"The optimization of weights in weighted hybrid recommendation algorithm","authors":"Wen-Hu Lin, Ying Li, Shuang Feng, Yongbin Wang","doi":"10.1109/ICIS.2014.6912169","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912169","url":null,"abstract":"In the field of recommender systems, the performance of every single recommendation algorithm is limited and each has its own strengths and weaknesses, so more attentions are paid to the hybrid recommendation algorithms. There are various hybridization strategies, this paper is focused on the weighted hybridization. In the weighted hybridization, researchers are always stumped by a problem -how to optimize the weights of each algorithm. When the number of algorithms of the weighted hybridization is less then 3, then we can fine tune the weight through repeating experiment, but when the number is more then 3, it is hard to get the weights through the same method. And that is what is addressed by this paper.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A block cipher based on Boolean matrices using bit level operations 基于布尔矩阵的分组密码,使用位级操作
P. VidhyaSaraswathi, M. Venkatesulu
{"title":"A block cipher based on Boolean matrices using bit level operations","authors":"P. VidhyaSaraswathi, M. Venkatesulu","doi":"10.1109/ICIS.2014.6912108","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912108","url":null,"abstract":"The security of multimedia data especially in video on demand and video conferencing applications are more important over networks. Traditional algorithms like DES, AES and IDEA are not suitable for real time applications because of large data size. From the process architecture view point, the bit level operations have ability to design very fast encryption algorithms and to secure next generation multimedia processing. This paper proposes a block cipher based on Boolean matrix theory and bit level permutation operations. The cipher is so designed that it can be implemented in hardware and software.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信