2010 International Conference on Information Science and Applications最新文献

筛选
英文 中文
Development of a Wearable ECG Recorder for Measuring Daily Stress 一种测量日常压力的可穿戴心电记录仪的研制
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480419
Yosiho Okada, Yi-Tsuyoshi Yoto, Taka-aki Suzuki, T. Sugiura, S. Sakuragawa
{"title":"Development of a Wearable ECG Recorder for Measuring Daily Stress","authors":"Yosiho Okada, Yi-Tsuyoshi Yoto, Taka-aki Suzuki, T. Sugiura, S. Sakuragawa","doi":"10.1109/ICISA.2010.5480419","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480419","url":null,"abstract":"The purpose of the study is to show the feasibility of a light-weight wearable electrocardiograph with three accelero-meters for monitoring stress in everyday life. It consists of an amplifier, a band pass filter, a microcomputer with an AD converter, a triaxial accelerometer, and a memory card. An ECG and three accelerations are sampled at 1 kHz for more than 24 hours, maximum 27 hours with a default battery and a memory card. The heart rate variability analysis program detects R waves and determines R-R intervals for 24 hours by a data acquisition algorithm. An algorithm was also developed. It was designed to reduce motion artifacts induced by body movements on ECG. Autonomic nervous activity levels are calculated based on the heart rate variability spectrum analysis. The availability of the system was tested for three subjects for three days by replacing the battery and memory card every 24 hours under each environment. Both short time rhythms and a circadian rhythm of autonomic nervous system were clearly observed. The feasibility of the system for monitoring the long-term stress level is discussed.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124944730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Opposition Based Genetic Algorithm with Cauchy Mutation for Function Optimization 基于对立的Cauchy变异遗传算法的函数优化
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480382
M. Iqbal, N. K. Khan, M. Jaffar, M. Ramzan, A. R. Baig
{"title":"Opposition Based Genetic Algorithm with Cauchy Mutation for Function Optimization","authors":"M. Iqbal, N. K. Khan, M. Jaffar, M. Ramzan, A. R. Baig","doi":"10.1109/ICISA.2010.5480382","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480382","url":null,"abstract":"Evolutionary algorithms (EA) have been used in data classification and data clustering task since the advent of these algorithms. Nonlinear complex optimization problems have been the area of interest since very long time. The EA have been applied successfully on these optimization problems. The evolutionary algorithms suffer a lot due to their slow convergence rate, mainly due to evolutionary nature of these algorithms. This paper presents a new mutation scheme for opposition based genetic algorithms (OGA-CM). This scheme tunes the population during evolutionary process effectively by using Cauchy Mutation (CM). The performance of the algorithm is tested over suit of 5 functions. Opposition based Genetic Algorithm (OGA) is used as competitor algorithm to compare the results of the proposed algorithm. The results show that the proposed method outperforms GA and OGA for most of the test functions.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Factors Influencing the Implementation of Information Systems Security Strategies in Organizations 影响组织实施信息系统安全策略的因素
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480261
Sangseo Park, Atif Ahmad, A. B. Ruighaver
{"title":"Factors Influencing the Implementation of Information Systems Security Strategies in Organizations","authors":"Sangseo Park, Atif Ahmad, A. B. Ruighaver","doi":"10.1109/ICISA.2010.5480261","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480261","url":null,"abstract":"Many organizations still rely on deterrence to control insider threats and on purely preventive strategies to control outsider threats. Such a simple approach to organizational information security is no longer viable given the increasing operational sophistication of current security threat agents and the complexity of information technology infrastructure. Effective implementation of security requires organizations to select a combination of strategies that work in tandem and best suits their security situation. This paper addresses the identification and classification of factors that influence implementation of security strategies in organizations. In this paper, we develop a preliminary architecture that aims to assist organizations in deciding how strategies can be designed to complement each other to improve the cost-effectiveness of security.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Determination of Water Content in Automobile Lubricant Using Near-Infrared Spectroscopy Improved by Machine Learning Analysis 机器学习分析改进的近红外光谱法测定汽车润滑油中水分含量
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480392
Yun Zhao, Xing Xu, Lulu Jiang, Yu Zhang, Li-hong Tan, Yong He
{"title":"Determination of Water Content in Automobile Lubricant Using Near-Infrared Spectroscopy Improved by Machine Learning Analysis","authors":"Yun Zhao, Xing Xu, Lulu Jiang, Yu Zhang, Li-hong Tan, Yong He","doi":"10.1109/ICISA.2010.5480392","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480392","url":null,"abstract":"The main objective of this paper is to determine the water content of automobile lubricant based on the near-infrared (NIR) spectra collected and to observe whether NIR spectroscopy could be used for predicting water content. Least square support vector machine (LS-SVM), back-propagation neural networks (BPNN) and Gaussian processes regression (GPR) were employed to develop prediction models. There were 150 samples for training set and test set, 6 inputs for one sample obtained by principle component analysis (PCA). LS-SVM models were developed with a grid search technique and RBF kernel function. The Levenberg-Marquardt algorithm was employed to optimize back-propagation neural network (BPNN) and models with 5 and 6 neurons in hidden layer were developed, respectively. The BPNN model with 5 neurons in hidden layer outperformed the one with 6 neurons. Three GPR models were built based on full data points (full GPR), subset of regressors (SR GPR) and subset of datasets (SD GPR), respectively, with Squared exponential (SE) covariance function. The full GPR outperformed SR GPR and SD GPR.The overall results indicted that the Gaussian processes model outperformed LS-SVM and BPNN model. GPR was an effective way for the regress prediction. NIR spectroscopy combined with PCA and GPR had the capability to determine the water content of automobile lubricant with high accuracy.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on Improving Web Cache Server Performance Using Delayed Caching 使用延迟缓存提高Web缓存服务器性能的研究
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480543
Daesung Lee, Kuinam J. Kim
{"title":"A Study on Improving Web Cache Server Performance Using Delayed Caching","authors":"Daesung Lee, Kuinam J. Kim","doi":"10.1109/ICISA.2010.5480543","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480543","url":null,"abstract":"As the number of Internet users increase explosively, the delay in network response time is also increasing. An economic and efficient solution for this problem is web caching. But the use of a cache server can cause another bottleneck because of the concentration of requests at the cache server. Many studies on improving cache server performance have been suggested, but existing studies have focused on load balancing and/or caching capacity, not directly on improving the throughput of a single cache server. In this paper, we analyze the causes of cache server bottleneck, and propose the delayed caching mechanism as a solution. We use delayed caching in order to improve system reliability and provide a quick service to users' service requests. The proposed cache server is implemented through a modification of the SQUID cache server, and we compare its performance with the original SQUID cache server.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Efficient Video Mosaic Panorama Algorithm 一种高效的视频拼接全景算法
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480527
Xin-bo Zhao, Xiaochun Zou, Zhong Ma, Yan Feng
{"title":"An Efficient Video Mosaic Panorama Algorithm","authors":"Xin-bo Zhao, Xiaochun Zou, Zhong Ma, Yan Feng","doi":"10.1109/ICISA.2010.5480527","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480527","url":null,"abstract":"Digital image mosaic is an active area of research. Generally, the significances of this synthetic panorama can be explained as follows: Firstly, increasing the angle of the optics system view. Secondly, the panorama can be used for image examining, editing, analysis and understanding. Thirdly, the virtual reality system can use the panorama to appear the virtual 3-D environment. So the research of such an efficient video mosaic panorama algorithm is necessary and possible. The algorithm employs the feature-based motion estimator to estimate the video motion model parameters. Thus, we can use the result to compose the panorama. After that, for the purpose of removing the foreground objects, we use the panorama estimation process. The test results showed that the proposed algorithm is efficient.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Discrete PSO for Data Classification 一种新的用于数据分类的离散粒子群
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480366
N. K. Khan, A. R. Baig, M. Iqbal
{"title":"A New Discrete PSO for Data Classification","authors":"N. K. Khan, A. R. Baig, M. Iqbal","doi":"10.1109/ICISA.2010.5480366","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480366","url":null,"abstract":"In this paper we have presented a new Discrete Particle Swarm Optimization approach to induce rules from the discrete data. The proposed algorithm initializes its population by taking into account the discrete nature of the data. It assigns different fixed probabilities to current, local best and the global best positions. Based on these probabilities, each member of the population updates its position iteratively. The performance of the proposed algorithm is evaluated on five different datasets and compared against 9 different classification techniques. The algorithm produces promising results by creating highly accurate rules for each dataset.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124433209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Forensic Model on Deleted-File Verification for Securing Digital Evidence 一种用于保护数字证据的删除文件验证法证模型
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480346
Yong-Ho Kim, Kunam J. Kim
{"title":"A Forensic Model on Deleted-File Verification for Securing Digital Evidence","authors":"Yong-Ho Kim, Kunam J. Kim","doi":"10.1109/ICISA.2010.5480346","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480346","url":null,"abstract":"The computer forensic technique that analyzes the file hidden in the computer or the file information of Windows has been widely used for the criminal check. However, these techniques had the different problems to be presented as the legal resources. The forensic viewpoint has 5 digital evidence principles such as legitimacy, identity, connectivity, speediness, integrity. This thesis is focused on the principle of connectivity. The principle of connectivity so far insisted the evidential connectivity of media, the Chain of Custody, but the research on the connectivity principle of file is not yet made. This thesis analyzed the cause of deleted file, and developed the best model. Also, it used the developed analysis technique to produce the respective model and the case for the precision of model, and applied the model to the case in order to experiment the precision detected. The detection model presented by this thesis will be the important judgmental data for the reliable evidence forensic.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
VoIP QoS(Quality of Service) Design of Measurement Management Process Model VoIP服务质量测量管理过程模型设计
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480523
Jeom-goo Kim, In-Sook Lee, S. Noh
{"title":"VoIP QoS(Quality of Service) Design of Measurement Management Process Model","authors":"Jeom-goo Kim, In-Sook Lee, S. Noh","doi":"10.1109/ICISA.2010.5480523","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480523","url":null,"abstract":"VoIP service exposes weakness on quality on QoS and reliability as it manages voice and data service together on a network. This paper diagnoses characteristic of voice quality on IP network as the question arises per VoIP service. It also diagnoses the characteristics of service quality and the problem of VoIP per H.323 protocol suite. For this reason, this paper proposes that VoIP QoS can be provided by managing the weakness of VoIP related protocol with design of measurement management process model for VoIP QoS. Furthermore, it proposes the use of analysed item and quality item driven per voice service from VoIP service quality measurement value of the site utilizing VoIP Service can increase the quality. It is proposed that the result of MOS, delay, jitter, loss value acquired per VoIP QoS as proposed can be used to assure the quality of signal, voice processing, filtering, security function, etc.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
XML Based Format for Exchange of Plagiarism Detection Results 基于XML的抄袭检测结果交换格式
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480402
Nousheen Samuel, Naima Samuel, S. Butakov
{"title":"XML Based Format for Exchange of Plagiarism Detection Results","authors":"Nousheen Samuel, Naima Samuel, S. Butakov","doi":"10.1109/ICISA.2010.5480402","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480402","url":null,"abstract":"There are a number of software tools and solutions on the market of digital plagiarism detection. Some of them work only as a standalone tools, some of them are hardcoded into university-wide learning management systems. XML based language for description of plagiarism detection results will serve as a light-weight integration platform that allows plagiarism detection tools to be easily integrated with existing learning management systems or university portals. Extended implementation of this language should allow end users to choose the most suitable plagiarism detection service. Such an exchange format will also provide a good opportunity for plagiarism detection services to compete on the market. This paper introduces the first draft of XML based language that describes the results of plagiarism detection. The proposed framework provides description of the findings done by a plagiarism detection service as a reply to a request for plagiarism check up. The description consists of three main parts: descriptions of the suspicious and source documents and description of the findings. The paper provides the detailed description of the format supported by extensive use of examples.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128464424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信