{"title":"A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks","authors":"Dongxun Jin, Joo-Seok Song","doi":"10.1109/ICIS.2014.6912147","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912147","url":null,"abstract":"In traffic safety related application of Vehicular Ad-hoc Networks (VANETs), security is a great important issue. Sybil attack is a particular kind of attack where the attacker illegitimately claims multiple identities. In the past years, several approaches have been proposed for solving this problem. They are categorized into PKI-based, infrastructure-based, observer-based, and resource-test-based schemes. In this paper, previous protocols are analyzed, and a novel scheme to detect the Sybil nodes in VANETs is presented, mitigating the effect of a Sybil attack. The proposed Sybil nodes detection scheme, Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs (PMSD), takes advantage of unmodifiable physical measurements of the beacon messages instead of key-based materials, which dose not only solve the Sybil attack problem, but also reduces the overhead for the detection. The proposed scheme does not require fixed infrastructure, which makes it easy to implement. To increase the detection accuracy, traffic flow theory and safety guard distance is introduced into the scheme. The simulation results show a 97% detection rate of Sybil nodes, with only about a 2% error rate.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129532378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DBN structure learning based on MI-BPSO algorithm","authors":"Guoliang Li, Xiaoguang Gao, Ruo-hai Di","doi":"10.1109/ICIS.2014.6912142","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912142","url":null,"abstract":"To improve the accuracy of structure learning for Dynamic Bayesian Network (DBN), this paper proposes Mutual Information-Binary Particle Swarm Optimization (MI-BPSO) algorithm. The MI-BPSO algorithm firstly uses MI and conditional independence test to prune the search space and speed up the convergence of the searching phase, then calls BPSO algorithm to search the constrained space and get the intra-network and inter-network of DBN. Experimental results show that this algorithm performs as well as K2 while it doesn't need a given variable ordering, and performs better than MWST-GES, MWST-HC and I-BN-PSO.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123622427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arkhom Songkroh, Rerkchai Fooprateepsiri, W. Lilakiatsakun
{"title":"An intelligent risk detection from driving behavior based on BPNN and Fuzzy Logic combination","authors":"Arkhom Songkroh, Rerkchai Fooprateepsiri, W. Lilakiatsakun","doi":"10.1109/ICIS.2014.6912116","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912116","url":null,"abstract":"Detection and identification of the driving behavior is an issue that has attention broadly in the study of the intelligent automotive systems. This research study presents the detection of the risk of drowsiness and distraction while driving. If his or her face not in the right direction when driving for more than 2 seconds, then alert to the driver depend on the detected risk level. From two reasons mentioned above. The system can be divided into three parts: the first part consists of the normalization of the image size to optimize the system performance and improve image quality by adjusting illumination using Histogram Equalization, the second part is procedural to detect the eyes and nose, then create a risk feature name as “Feature of Driver Risk (FODR)” to know the possible direction of the faces with Haar-Like Feature, the third part is procedural of data classification. In addition, calculation of risky for alert by used BPNN and Fuzzy Logic. This study uses a mobile phone camera by shooting in front of the driver during day time by 5 people with 6000 frames for each person. The study found that, the accuracy in calculating the risk was 78.43 and 87.12 percent, respectively.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116625576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated method for hierarchy construction of domain-specific terms","authors":"Yin Kang, Lina Zhou, Dongsong Zhang","doi":"10.1109/ICIS.2014.6912181","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912181","url":null,"abstract":"Understanding text requires not only the extraction of individual concepts, but the identification of semantic relationships among concepts as well. Lexical resources have been applied to analyzing text in a wide range of applications. However, manual compilation of lexical resources is difficult to keep up with the rapid increase of the volume and diversity of user-generated content on the web. Automatic concept hierarchy construction has been considered as one solution to the above problem. Despite extensive effort on automatic construction of concept hierarchies, few studies have focused on the concepts of specific domains. In this study, we propose a comprehensive framework for building a domain-specific concept hierarchy. By synthesizing different types of measurements of relatedness among concepts, we propose an integrated method for building a multi-branch hierarchy of product features from online consumer reviews. The experiment results show that the proposed algorithm successfully reconstructs almost an entire hierarchy except for missing a few concepts and links. Starting from scratch, the algorithm reconstructed about 60% of the manually constructed hierarchy. The proposed method can be used to improve search results by better understanding user queries, and to facilitate personalized recommendations in e-commerce.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129430919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal hybrid face recognition based on score level fusion using Relevance Vector Machine","authors":"Taher Khadhraoui, F. Benzarti, H. Amiri","doi":"10.1109/ICIS.2014.6912136","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912136","url":null,"abstract":"In this paper, we present a novel fusion approach 2D and 3D face recognition based on score level fusion using Relevance Vector Machine. RVM uses a combination of kernel functions on training data for classification and compared to SVM. Several novelties are introduced to make the recognition robust to facial expressions. These novelties include: Automatic invariant feature in the pose and in the facial expressions is calculated from 2D facial image and from the point cloud and to generate a local descriptor. These two descriptors are reduced separately by the Principal Component Analysis to provide two scores which are normalized and then are fused to improve the recognition performance. The proposed approach is tested on a CASIA-3D database, the total number of scans is 4674 among which 38 scans per person are available. The results are found to be promising, and show the potential of our approach, we obtain a 99.4% verification rate at 0.01 FAR.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The future of e-service value","authors":"T. Matsuo","doi":"10.1109/ICIS.2014.6912097","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912097","url":null,"abstract":"Summary form only given. Service science research has been developing rapidly in this decade and provided a lot of contributions to enhance the value of information systems. At this point, most of IT scientists are promoting their researches based on the concept what information systems make an effective, an optimal, and confortable society. Since the e-services are provided to users, we have to define their value on user-friendliness, sustainability, economical efficiencies, effectiveness, satisfaction, and some other viewpoints. In this talk, we introduce the service fit model to realize what the users utilities are enhanced by e-services. The former half, we discuss the irrational issues of human activity and thinking. Even though some splendid services are provided by the information systems, people sometimes do not think and feel their value because their thinking and services are not fitted. For example, although word-processing software has a lot of function to edit the documents and the personal computer has memory to memorize a ton of data, people sometimes have paper and pencil nearby. This means that the software and the computer do not meet the needs. In latter half, we introduce some examples and actual cases where the systems provide smart services and functions. IT solutions in tourism industry and semiconductors industry are introduced at the end of this talk.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Smart grid scheduling based on contract net protocol with trust model","authors":"Xiang Zhao, Guangyu Hu, Z. Wu","doi":"10.1109/ICIS.2014.6912170","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912170","url":null,"abstract":"Smart grid is the intelligent power grid, in which Scheduling system is the most important part. In this paper, we will introduce a new schedule system based on contract net protocol improved scheduling efficiency. As one of the most important coordination mechanism, contract net protocol (CNP) has been extensively studied in many areas, and many other techniques can also be used to improve the quality of decision. The new CNP is based on trust mechanism, that makes the system more efficient scheduling. Experimental results show that the initiators with trust model almost steadily get the best participants no matter the environment is honest-dominated or dishonest-dominated. Even in the dishonest-dominated environment, this approach gets better results and is proved valuable.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang-Woo Cho, Chung-Pyo Hong, Jin-Chun Piao, Yeong-Kyu Lim, Shin-Dug Kim
{"title":"Performance optimization of 3D applications by OpenGL ES library hooking in mobile devices","authors":"Chang-Woo Cho, Chung-Pyo Hong, Jin-Chun Piao, Yeong-Kyu Lim, Shin-Dug Kim","doi":"10.1109/ICIS.2014.6912179","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912179","url":null,"abstract":"The mobile GPU (Graphic Processing Unit) market has grown steadily due to expansion of the mobile game industry. Despite the rapid computation capability of mobile devices, handling a large amount of high-quality graphics in real-time is difficult. Therefore, effective technologies for improving mobile GPU in smartphones are required. In this thesis, we examine the trade-off between quality and performance, and address the benefits of graphic performance improvement by degrading quality. To implement this idea, we propose performance optimization methodologies for 3D applications using an OpenGL ES library hooking method. Our methodologies do not require any source code from 3D applications, and can be applied to any Android phones that use OpenGL ES in real-time. To demonstrate the benefits of our methodology, we conducted performance verifications of five well-known benchmarks using a smartphone, and measured the quality in accordance with each methodology. In addition, we showed the optimal trade-offs between quality and performance. By using the proposed technique, the performance of mobile GPU can be significantly improved to achieve a better trade-off between quality and performance.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of mosaic line-scan camera based on FPGA","authors":"Hupei Xia, Xinyan Su, Peizhen Liu, Bin Liu","doi":"10.1109/ICIS.2014.6912176","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912176","url":null,"abstract":"According to the problem that single line-scan camera loss of light in the edge of the sensor when the field of view is large, this paper presents a design of mosaic camera based on FPGA. Using the method of putting multiple cameras arranged in a straight line to share the field of view and reduce the view angle of every camera. Then, in view of the practical application of detecting doping micro particles, the paper designed a detection algorithm of the target's location in the FPGA. Finally, the practicability and stability of the system were validated experimentally. The results of the experiment show: The camera imaging clearly, edge light loss is little and can accurately distinguish between target and background.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Topology Control for QoS of ad hoc wireless network","authors":"Huan Li","doi":"10.1109/ICIS.2014.6912100","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912100","url":null,"abstract":"This paper we discusses the energy efficient topology control issue in ad hoc wireless networks. In order to find an optimal network topology that has maximal network lifetime meet QoS requirements, which is involved with traffic requirements, hop bound and bandwidth, we design an Energy Efficient Topology Control algorithm that integrates a relevant QoS Routing algorithm. In the course of comparing most of algorithms concentrated on how to minimize energy consumption, the combined analytical and numerical results indicate this optimal algorithm can obtain an optimal network lifetime, which is a genuine time value and more significant and reasonable than taking minimizing energy consumption into account purely.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"34 1-6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}