{"title":"Scalable resolution-based image coding algorithm","authors":"Phakphoom Claiboon, S. Wongthanavasu","doi":"10.1109/JCSSE.2014.6841839","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841839","url":null,"abstract":"Currently, multimedia data has become increasingly more important with the growth of the Internet. Images are one example of sharing across the internet, especially through social media applications. More specifically, nearly every website consists of a considerable amount of image data. Some pictures are stored in multiple resolutions to be displayed as desired. When the same image is stored in different resolutions, it is difficult to manage. This paper presents an algorithm for image coding in scalable resolution. The proposed method consists of an intra-prediction and reversible cellular automata. Intra-predication aims to reduce the data to be compressed and reversible cellular automata allows image data to increase or decrease to the desired resolution. For the performance evaluation, an 8-bit grayscale was experimented with using the proposed method and then compared with JPEG2000 and RCAGIC using PSNR and SSIM statistics. In this regard, the proposed method provides more promising results than RCAGIC and JPEG2000.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying cloud provider security conformance to cloud controls matrix","authors":"Nuttapong Pumvarapruek, T. Senivongse","doi":"10.1109/JCSSE.2014.6841879","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841879","url":null,"abstract":"Security of cloud services is a major concern to cloud consumers when selecting cloud providers. Sufficient security information should be provided so that consumer trust in cloud services can be built, but in practice, security information is critical and may not be publicized. During the service selection process, cloud consumers therefore have to study published information on the cloud providers' Web sites or the cloud providers registry in order to assess how secure the services are. To assist cloud consumers in service selection, this paper presents an initial attempt to apply text classification to classify published information on the providers' Web pages to determine which security best practices and guidelines the providers have followed in providing their services. We take the security best practices and guidelines from the Cloud Controls Matrix (CCM) and the accompanying Consensus Assessments Initiative Questionnaire (CAIQ), and compile a set of security concepts before using it as a basis for classifying the providers' Web pages. The classification result roughly signifies the security conformance level of the providers. We demonstrate this method and present an evaluation using the case of five public cloud providers.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126307653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The classifier model for prediction quail gender after birth based on external factors of quail egg","authors":"U. Suksawatchon, Pongpat Singsri","doi":"10.1109/JCSSE.2014.6841884","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841884","url":null,"abstract":"This paper proposes the classification model to identify the quail gender which considered from only the external factors of quail egg. The six classifier models were studied including decision tree-J48, ADTree, Support Vector Machine-LibSVM, SMO, Multilayer Perceptron, and NaïveBayes. We evaluated each classifier model using 10-fold cross validation with 120 subsets obtained from 661 quail eggs. A number of external factors acquired from quail eggs in each subset were difference that was the combination among seven external factors. The result showed that the J48 decision tree achieved the highest accuracy up to 80% with only using 5 external factors. Therefore, this research can be beneficial to quail farmers in reducing costs to feed male quail and can be value added to quail eggs, as well.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guowei Dong, Yan Zhang, Xin Wang, Peng Wang, Liangkun Liu
{"title":"Detecting cross site scripting vulnerabilities introduced by HTML5","authors":"Guowei Dong, Yan Zhang, Xin Wang, Peng Wang, Liangkun Liu","doi":"10.1109/JCSSE.2014.6841888","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841888","url":null,"abstract":"Recent years, HTML5 is widely adopted in popular browsers. Unfortunately, as a new Web standard, HTML5 may expand the Cross Site Scripting (XSS) attack surface as well as improve the interactivity of the page. In this paper, we identified 14 XSS attack vectors related to HTML5 by a systematic analysis about new tags and attributes. Based on these vectors, a XSS test vector repository is constructed and a dynamic XSS vulnerability detection tool focusing on Webmail systems is implemented. By applying the tool to some popular Webmail systems, seven exploitable XSS vulnerabilities are found. The evaluation result shows that our tool can efficiently detect XSS vulnerabilities introduced by HTML5.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retrieving sequence diagrams using genetic algorithm","authors":"H. O. Salami, Moataz A. Ahmed","doi":"10.1109/JCSSE.2014.6841889","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841889","url":null,"abstract":"The benefits of software reuse are multiplied if it is carried out in the early stages of software development. Sequence diagrams are commonly used to model the functionality of software systems at the initial stages (e.g. during requirements analysis) of the software development life cycle. In this work we utilize Genetic Algorithm (GA) for determining the similarity of graphical representations of sequence diagrams, in order to aid the retrieval of similar sequence diagrams from a repository. Experimental results show that the introduction of GA in the graph similarity computation leads to very significant improvements in retrieval quality compared to the existing method which utilizes a deterministic graph similarity algorithm.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new simple Wi-Fi direct connection method using NFC on remote control and DTV","authors":"Suk-Un Yoon, Shekhar Joshi, Seung-seop Shim","doi":"10.1109/JCSSE.2014.6841862","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841862","url":null,"abstract":"Due to the wide use of Wi-Fi technology, recent customer electronics such as smart phone, digital TV, laptop, refrigerator, air conditioner, robot vacuum and etc. provide Wi-Fi communication including Wi-Fi Direct (Peer-to-Peer) communication. For a simple and easy connection management between a smart phone and DTV, near field communication (NFC) is recently introduced. When a user brings a smart phone into close proximity of the NFC equipped remote control, the smart phone can directly connect DTV without peer discovery process of Wi-Fi Direct. In this paper, we implement the simple connection method between a smart phone and a DTV equipped with the NFC enabled remote control. The application of the simple and easy connection management, however, is limited to the NFC equipped customer electronics. Thus, the paper proposes a new simple wireless connection method, called Virtual NFC (VNFC), between a smart phone and existing customer electronics, which have Wi-Fi or BT (Bluetooth) module without NFC, using a set of NFC enabled remote control and DTV. In the proposed system, a set of DTV and NFC equipped remote control acts as virtual NFC device which relay the device information of customer electronics for Wi-Fi Direct connection without the peer discovery procedure. We implement the proposed NFC and VNFC architecture as prototype systems. The NFC based simple Wi-Fi Direct connection method reduces the connection setup time by 49% and the proposed VNFC based method reduces the connection setup time by 60%. The proposed VNFC idea has been registered as patent applications.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelizing the cellular potts model on GPU and multi-core CPU: An OpenCL cross-platform study","authors":"Chao Yu, Boling Yang","doi":"10.1109/JCSSE.2014.6841853","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841853","url":null,"abstract":"In this paper, we present the analysis and development of a cross-platform OpenCL parallelization of the Cellular Potts Model (CPM). In general, the evolution of the CPM is time-consuming. Using data-parallel programming model such as CUDA can accelerate the process, but it is highly dependent on the hardware type and manufacturer. Recently, OpenCL has attracted a lot of attention and been widely used by researchers. OpenCL provides a flexible solution, which allows us to come up with an implementation that can execute on both GPUs and multi-core CPUs regardless of the hardware type and manufacturer. Some optimizations are also made for both GPU and multi-core CPU implementations of the CPM, and we also propose a resource management method, MLBBRM. Experimental results show that the developed optimized algorithms for both GPU and multi-core CPU have an average speedup of about 30× and 8× respectively compared with the single threaded CPU implementation.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127694483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MapReduce join strategies for key-value storage","authors":"Duong Van Hieu, Sucha Smanchat, P. Meesad","doi":"10.1109/JCSSE.2014.6841861","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841861","url":null,"abstract":"This paper analyses MapReduce join strategies used for big data analysis and mining known as map-side and reduce-side joins. The most used joins will be analysed in this paper, which are theta-join algorithms including all pair partition join, repartition join, broadcasting join, semi join, per-split semi join. This paper can be considered as a guideline for MapReduce application developers for the selection of join strategies. The analysis of several join strategies for big data analysis and mining is accompanied by comprehensive examples.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of the constant prediction time of collaborative filtering algorithms by using time contexts","authors":"Sumet Darapisut, J. Suksawatchon","doi":"10.1109/JCSSE.2014.6841885","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841885","url":null,"abstract":"This research presents the comparison of collaborative filtering techniques which are Tendencies Based Algorithm, Item mean algorithm, and Simple mean based algorithm. All these algorithms use the constant time in prediction process. To evaluate our proposed model, we use last.fm dataset including music listening history of each user. Each user's profile is split into several sub-profiles based on specified time ranges called “Time Contexts”. Thus the prediction is done using these Time Contexts instead of a single user profile. From our experiments, we have found that Tendencies Based Algorithm with Time Contexts is effective. It is given more accuracy and much more efficient computationally than tradition collaborative filtering algorithms.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-criteria item-based collaborative filtering framework","authors":"Alper Bilge, C. Kaleli","doi":"10.1109/JCSSE.2014.6841835","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841835","url":null,"abstract":"Collaborative filtering methods are utilized to provide personalized recommendations for users in order to alleviate information overload problem in different domains. Traditional collaborative filtering methods operate on a user-item matrix in which each user reveal her admiration about an item based on a single criterion. However, recent studies indicate that recommender systems depending on multi-criteria can improve accuracy level of referrals. Since multi-criteria rating-based collaborative filtering systems consider users in multi-aspects of items, they are more successful at forming correlation-based user neighborhoods. Although, proposed multi-criteria user-based collaborative filtering algorithms' accuracy results are very promising, they have online scalability issues. In this paper, we propose an item-based multi-criteria collaborative filtering framework. In order to determine appropriate neighbor selection method, we compare traditional correlation approaches with multi-dimensional distance metrics. Also, we investigate accuracy performance of statistical regression-based predictions. According to real data-based experiments, it is possible to produce more accurate recommendations by utilizing multi-criteria item-based collaborative filtering algorithm instead of a single criterion rating-based algorithm.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}