2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
Inconsistencies of connection for heterogeneity and a new relation discovery method that solved them 针对异构性的连接不一致问题,提出了一种新的关系发现方法
T. Nakanishi, Kiyotaka Uchimoto, Y. Kidawara
{"title":"Inconsistencies of connection for heterogeneity and a new relation discovery method that solved them","authors":"T. Nakanishi, Kiyotaka Uchimoto, Y. Kidawara","doi":"10.1109/ICIS.2013.6607892","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607892","url":null,"abstract":"We represent the inconsistencies of the past research on the connections among such heterogeneous fields as Linked Data, Semantic Web, Bridge Ontology, and Schema Mapping as well as our own past researches. Graph structures are commonly represented as links in relationships. For the same domain, the relationships agree with each other in the domain, because the transitive and order relations are defined. However, in most heterogeneous domains, we have to define the new order relation to link heterogeneous sets. This limit exists when we consider the relation among heterogeneous fields in set theory. Three inconsistencies of linking heterogeneous resources exist: 1) the inconsistency that shows that the relation does not guarantee the future; 2) the inconsistency where no transitive relation is true, when anyone connects links for heterogeneous fields; and 3) the inconsistency where no relation in heterogeneous fields can be discovered in set theory. Closed assumption systems have already reached their limit. In the big data era, we must consider a new framework for the Three Opened Assumption's Evil. As one solution, we present a map transformation method from set theory to the Cartesian system of coordinates to interconnect these heterogeneous sets and the Three Opened Assumption's Evil by two easy mathematical proofs of transitive and order relations to interconnect the heterogeneous resources. In addition, we define a new functional predicate as an example of a map transformation from set theory to a Cartesian system of coordinates to interconnect the heterogeneous resources for our solution. We also define a “dependOn” function as an example of this framework.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An architecture of operating system utilizing non-volatile main memory and heterogeneous multi-core 一种利用非易失性主存和异构多核的操作系统体系结构
Gaku Nakagawa, S. Oikawa
{"title":"An architecture of operating system utilizing non-volatile main memory and heterogeneous multi-core","authors":"Gaku Nakagawa, S. Oikawa","doi":"10.1109/ICIS.2013.6607900","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607900","url":null,"abstract":"Reducing power consumption is a serious issue for today's computer systems. The measure to that issue, nonvolatile memory (NVM) and heterogeneous multicore architecture (HMA) draw attention. Non-volatile memory is the device that can maintain data without continuous power supply. This nonvolatile memory enable to reduce power consumption of main memory and zero-overhead hibernation. Heterogeneous multi-core architectures combine different cores. The cores are different each other in terms of instruction set architecture, circuit size and so on. Combination of various characteristics has significant possibility to achieve energy-efficient computer system. For the above reasons, combination of NVM and HMA enable to reduce power consumption of today's computer systems. Assuming using non volatile main memory, Operating System (OS) must be strict about memory management. Because, running time of OS go longer and risk of memory leaks get higher. In addition, code quality of OS must be high. To keep code quality, strong typing is useful. However C, which is mainstream of OS implementation, do not have mechanism avoid memory leak and strong typing mechanism. To solve this issue, there are some researches of implementing OS in Java have many case. However, previous works have certain performance problem. To solve this, we propose a new operating system architecture. This architecture aims that native machine code run as user programs while OS kernel is implemented in java. In this paper, we describe proposed architecture, explain a preliminary implementation of it, and show experiment by that implementation.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved normalized min-sum algorithm for LDPC codes 一种改进的LDPC码归一化最小和算法
Jinlei Chen, Yan Zhang, Ruiyi Sun
{"title":"An improved normalized min-sum algorithm for LDPC codes","authors":"Jinlei Chen, Yan Zhang, Ruiyi Sun","doi":"10.1109/ICIS.2013.6607890","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607890","url":null,"abstract":"An improved normalized min-sum (IN-MS) algorithm is proposed for decoding low-density parity-check (LDPC) codes. In this algorithm, two normalized factors are used in check node computing, one for the minimum data and another for the second minimum data, and this algorithm achieves a better approximation to the BP algorithm. Simulation results show that the decoding performance of IN-MS algorithm is better than that of the normalized min-sum (NMS) algorithm.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Strengthening the rice production in Thailand through Community Rice Centers (CRCs) using ICT policies 通过社区稻米中心(CRCs)利用信息通信技术政策加强泰国的稻米生产
Norrasing Sangbuapuan
{"title":"Strengthening the rice production in Thailand through Community Rice Centers (CRCs) using ICT policies","authors":"Norrasing Sangbuapuan","doi":"10.1109/ICIS.2013.6607899","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607899","url":null,"abstract":"The focus of this is on the strengthening of rice farmers for more efficient produce cropping, using Information and Communication Technology (ICT) policies as a tool to improve knowledge and skill, which leads to the better cropping yield. Thai government is currently aware of the related issues and attempts to support ICT policies to rice production especially the field data management and the transferring of knowledge and know-how to the rice farmers. The ultimate goal is to develop of the smarter farmers to elevate the Thai farmers' potential as do developed countries. ICT policies are one of solutions to assist farmers to grain better cropping yield via the accessibility to the publicized information. The Community Rice Centers (CRCs), under the supervision of the Rice Department of Thailand, was established as direct information channels from the government to rice farmers. Next, the development of current ICT policies is proposed, in order to address these issues. The final goal is to guide the development of ICT policies in the related government entities.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115668532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Type-2 micro virtual machine monitor for ARM-based mobile systems 用于基于arm的移动系统的Type-2微型虚拟机监视器
Young-woo Jung, Kwang-Won Koh, Changjin Ahn, Sang-Wook Kim
{"title":"Type-2 micro virtual machine monitor for ARM-based mobile systems","authors":"Young-woo Jung, Kwang-Won Koh, Changjin Ahn, Sang-Wook Kim","doi":"10.1109/ICIS.2013.6607901","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607901","url":null,"abstract":"This paper presents the type-2 micro virtual machine monitor (ViMo-T2) for ARM-based mobile systems. It is implemented as a kernel module of the host operating system (OS) and enables to run multiple OSs on a single mobile device simultaneously. Since ViMo-T2 is layered upon the host OS that was already installed by a device manufacture, it is applicable to the existing mobile system at user's own risk, so that time and cost developing a virtualized mobile system can be reduced.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An application of scale-invariant feature transform in iris recognition 尺度不变特征变换在虹膜识别中的应用
Weijie Zhao, Xiaodong Chen, Ji Cheng, Linhua Jiang
{"title":"An application of scale-invariant feature transform in iris recognition","authors":"Weijie Zhao, Xiaodong Chen, Ji Cheng, Linhua Jiang","doi":"10.1109/ICIS.2013.6607844","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607844","url":null,"abstract":"Scale-invariant Feature Transform (SIFT) is an algorithm to find local features in images. SIFT uses Difference-of-Gaussian (DoG) to locate candidate keypoints and performs a detailed fit to locate keypoints, then orientations are added to keypoints and keypoint descriptor is generated for each keypoint. Iris recognition is one of the most reliable biometric authentications. In this paper, we propose a reliable method of iris recognition by applying SIFT. It includes segmentation, matching and evaluation. Other than the conventional method, Normalizing and encoding are removed since SIFT is rotation-invariant and scale-invariant. Our proposed method is tested on CASIA and self-obtained images. Experiments show the proposed method is fast and accurate.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"53 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Layout-tree-based approach for identifying visually similar blocks in a web page 基于布局树的方法,用于识别网页中视觉上相似的块
Jun Zeng, Brendan Flanagan, S. Hirokawa
{"title":"Layout-tree-based approach for identifying visually similar blocks in a web page","authors":"Jun Zeng, Brendan Flanagan, S. Hirokawa","doi":"10.1109/ICIS.2013.6607818","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607818","url":null,"abstract":"When extracting information from a web page, IE systems usually need to perform pattern recognition to identify the elements that have similar patterns. However, most of them are mainly based on analyzing HMTL source code, DOM tree, tag tree or Xpath of web pages. These methods are language-dependent, or more precisely, HTML-dependent. They have some insuperable limitations. In order to overcome these limitations, we propose a notion of layout-tree and a pattern recognition method to identify visual blocks with similar visual pattern using layout tree. In this paper, we call a visible rectangular region in a web page a visual block or block for short. We consider if the elements of two blocks are displayed in a similar layout, we define that the two blocks are visually similar. We first transform the layout into a layout tree. By calculating the similarity of the layout trees of two blocks, we can determine whether the two blocks are visually similar or not. The result of experiment shows that the layout tree is an effective method to identify visually similar blocks.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying health belief model to explore the adoption of telecare 应用健康信念模型探讨远程医疗的采用
B. Chuang, Chung-Hung Tsai, H. Hsieh, Tumurtushaa Tumurtulga
{"title":"Applying health belief model to explore the adoption of telecare","authors":"B. Chuang, Chung-Hung Tsai, H. Hsieh, Tumurtushaa Tumurtulga","doi":"10.1109/ICIS.2013.6607853","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607853","url":null,"abstract":"The purpose of the study is to integrate Self Efficacy with the Health Belief Model in order to explore the usage intention model of Telecare systems. The proposed framework is validated with respondents from Nantou County, which is located in Taiwan. This study emphasizes that hospital managers should pay more attention to understanding the five concepts of health belief of elderly (Perceived Susceptibility, Perceived Severity, Perceived Benefits, Perceived Barriers and Cues to Action), and improving Self Efficacy of elderly. We adopted the questionnaire survey for data collection, and examined our hypotheses by applying the structural equation modeling (SEM) method to validate the model. The integrative viewpoint implies that a successful telecare system is not only an information system but also a medical service provider/department to the patients/residents. The findings may be used as a theoretical basis for future research and can also offer empirical foresight to the executives and managers of hospitals when they initially introduce and promote the telecare systems into their surrounding community.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reduction of resolution for binary images by an octal grid graph representation model 用八进制网格图表示模型降低二值图像的分辨率
Yuki Shindo, Taiyou Kikuchi, Koichi Anada, S. Koka, T. Yaku
{"title":"Reduction of resolution for binary images by an octal grid graph representation model","authors":"Yuki Shindo, Taiyou Kikuchi, Koichi Anada, S. Koka, T. Yaku","doi":"10.1109/ICIS.2013.6607876","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607876","url":null,"abstract":"We deal with a data structure which is suitable for expression of the binary images. In general, binary images are expressed in raster data or rectangular dissections. In this paper, we describe that it is possible to reduce effectively the number of nodes in raster data represented by “octgrid” which is a type of octal grid graphs to handle heterogeneous rectangular dissections. Precisely, we propose algorithms to reduce the resolution of binary images represented by “octgrid”. Furthermore, we compare by examples our method with the Hilbert scanning, and show that our method reduces the rectangular number by less than 50% than the Hilbert scanning does, in several examples.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-agent technology for designing adaptive business processes 设计自适应业务流程的多代理技术
G. Rzevski
{"title":"Multi-agent technology for designing adaptive business processes","authors":"G. Rzevski","doi":"10.1109/ICIS.2013.6607821","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607821","url":null,"abstract":"Complexity of the Internet based global market is increasing relentlessly. To survive and prosper under new conditions business processes need to be adaptable, which means capable of positively reacting to frequent disruptions. A methodology and technology for designing adaptable business processes is outlined and examples are given of solutions supplied to commercial enterprises.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信