{"title":"Inconsistencies of connection for heterogeneity and a new relation discovery method that solved them","authors":"T. Nakanishi, Kiyotaka Uchimoto, Y. Kidawara","doi":"10.1109/ICIS.2013.6607892","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607892","url":null,"abstract":"We represent the inconsistencies of the past research on the connections among such heterogeneous fields as Linked Data, Semantic Web, Bridge Ontology, and Schema Mapping as well as our own past researches. Graph structures are commonly represented as links in relationships. For the same domain, the relationships agree with each other in the domain, because the transitive and order relations are defined. However, in most heterogeneous domains, we have to define the new order relation to link heterogeneous sets. This limit exists when we consider the relation among heterogeneous fields in set theory. Three inconsistencies of linking heterogeneous resources exist: 1) the inconsistency that shows that the relation does not guarantee the future; 2) the inconsistency where no transitive relation is true, when anyone connects links for heterogeneous fields; and 3) the inconsistency where no relation in heterogeneous fields can be discovered in set theory. Closed assumption systems have already reached their limit. In the big data era, we must consider a new framework for the Three Opened Assumption's Evil. As one solution, we present a map transformation method from set theory to the Cartesian system of coordinates to interconnect these heterogeneous sets and the Three Opened Assumption's Evil by two easy mathematical proofs of transitive and order relations to interconnect the heterogeneous resources. In addition, we define a new functional predicate as an example of a map transformation from set theory to a Cartesian system of coordinates to interconnect the heterogeneous resources for our solution. We also define a “dependOn” function as an example of this framework.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An architecture of operating system utilizing non-volatile main memory and heterogeneous multi-core","authors":"Gaku Nakagawa, S. Oikawa","doi":"10.1109/ICIS.2013.6607900","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607900","url":null,"abstract":"Reducing power consumption is a serious issue for today's computer systems. The measure to that issue, nonvolatile memory (NVM) and heterogeneous multicore architecture (HMA) draw attention. Non-volatile memory is the device that can maintain data without continuous power supply. This nonvolatile memory enable to reduce power consumption of main memory and zero-overhead hibernation. Heterogeneous multi-core architectures combine different cores. The cores are different each other in terms of instruction set architecture, circuit size and so on. Combination of various characteristics has significant possibility to achieve energy-efficient computer system. For the above reasons, combination of NVM and HMA enable to reduce power consumption of today's computer systems. Assuming using non volatile main memory, Operating System (OS) must be strict about memory management. Because, running time of OS go longer and risk of memory leaks get higher. In addition, code quality of OS must be high. To keep code quality, strong typing is useful. However C, which is mainstream of OS implementation, do not have mechanism avoid memory leak and strong typing mechanism. To solve this issue, there are some researches of implementing OS in Java have many case. However, previous works have certain performance problem. To solve this, we propose a new operating system architecture. This architecture aims that native machine code run as user programs while OS kernel is implemented in java. In this paper, we describe proposed architecture, explain a preliminary implementation of it, and show experiment by that implementation.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved normalized min-sum algorithm for LDPC codes","authors":"Jinlei Chen, Yan Zhang, Ruiyi Sun","doi":"10.1109/ICIS.2013.6607890","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607890","url":null,"abstract":"An improved normalized min-sum (IN-MS) algorithm is proposed for decoding low-density parity-check (LDPC) codes. In this algorithm, two normalized factors are used in check node computing, one for the minimum data and another for the second minimum data, and this algorithm achieves a better approximation to the BP algorithm. Simulation results show that the decoding performance of IN-MS algorithm is better than that of the normalized min-sum (NMS) algorithm.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthening the rice production in Thailand through Community Rice Centers (CRCs) using ICT policies","authors":"Norrasing Sangbuapuan","doi":"10.1109/ICIS.2013.6607899","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607899","url":null,"abstract":"The focus of this is on the strengthening of rice farmers for more efficient produce cropping, using Information and Communication Technology (ICT) policies as a tool to improve knowledge and skill, which leads to the better cropping yield. Thai government is currently aware of the related issues and attempts to support ICT policies to rice production especially the field data management and the transferring of knowledge and know-how to the rice farmers. The ultimate goal is to develop of the smarter farmers to elevate the Thai farmers' potential as do developed countries. ICT policies are one of solutions to assist farmers to grain better cropping yield via the accessibility to the publicized information. The Community Rice Centers (CRCs), under the supervision of the Rice Department of Thailand, was established as direct information channels from the government to rice farmers. Next, the development of current ICT policies is proposed, in order to address these issues. The final goal is to guide the development of ICT policies in the related government entities.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115668532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Young-woo Jung, Kwang-Won Koh, Changjin Ahn, Sang-Wook Kim
{"title":"Type-2 micro virtual machine monitor for ARM-based mobile systems","authors":"Young-woo Jung, Kwang-Won Koh, Changjin Ahn, Sang-Wook Kim","doi":"10.1109/ICIS.2013.6607901","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607901","url":null,"abstract":"This paper presents the type-2 micro virtual machine monitor (ViMo-T2) for ARM-based mobile systems. It is implemented as a kernel module of the host operating system (OS) and enables to run multiple OSs on a single mobile device simultaneously. Since ViMo-T2 is layered upon the host OS that was already installed by a device manufacture, it is applicable to the existing mobile system at user's own risk, so that time and cost developing a virtualized mobile system can be reduced.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weijie Zhao, Xiaodong Chen, Ji Cheng, Linhua Jiang
{"title":"An application of scale-invariant feature transform in iris recognition","authors":"Weijie Zhao, Xiaodong Chen, Ji Cheng, Linhua Jiang","doi":"10.1109/ICIS.2013.6607844","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607844","url":null,"abstract":"Scale-invariant Feature Transform (SIFT) is an algorithm to find local features in images. SIFT uses Difference-of-Gaussian (DoG) to locate candidate keypoints and performs a detailed fit to locate keypoints, then orientations are added to keypoints and keypoint descriptor is generated for each keypoint. Iris recognition is one of the most reliable biometric authentications. In this paper, we propose a reliable method of iris recognition by applying SIFT. It includes segmentation, matching and evaluation. Other than the conventional method, Normalizing and encoding are removed since SIFT is rotation-invariant and scale-invariant. Our proposed method is tested on CASIA and self-obtained images. Experiments show the proposed method is fast and accurate.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"53 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Layout-tree-based approach for identifying visually similar blocks in a web page","authors":"Jun Zeng, Brendan Flanagan, S. Hirokawa","doi":"10.1109/ICIS.2013.6607818","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607818","url":null,"abstract":"When extracting information from a web page, IE systems usually need to perform pattern recognition to identify the elements that have similar patterns. However, most of them are mainly based on analyzing HMTL source code, DOM tree, tag tree or Xpath of web pages. These methods are language-dependent, or more precisely, HTML-dependent. They have some insuperable limitations. In order to overcome these limitations, we propose a notion of layout-tree and a pattern recognition method to identify visual blocks with similar visual pattern using layout tree. In this paper, we call a visible rectangular region in a web page a visual block or block for short. We consider if the elements of two blocks are displayed in a similar layout, we define that the two blocks are visually similar. We first transform the layout into a layout tree. By calculating the similarity of the layout trees of two blocks, we can determine whether the two blocks are visually similar or not. The result of experiment shows that the layout tree is an effective method to identify visually similar blocks.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Chuang, Chung-Hung Tsai, H. Hsieh, Tumurtushaa Tumurtulga
{"title":"Applying health belief model to explore the adoption of telecare","authors":"B. Chuang, Chung-Hung Tsai, H. Hsieh, Tumurtushaa Tumurtulga","doi":"10.1109/ICIS.2013.6607853","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607853","url":null,"abstract":"The purpose of the study is to integrate Self Efficacy with the Health Belief Model in order to explore the usage intention model of Telecare systems. The proposed framework is validated with respondents from Nantou County, which is located in Taiwan. This study emphasizes that hospital managers should pay more attention to understanding the five concepts of health belief of elderly (Perceived Susceptibility, Perceived Severity, Perceived Benefits, Perceived Barriers and Cues to Action), and improving Self Efficacy of elderly. We adopted the questionnaire survey for data collection, and examined our hypotheses by applying the structural equation modeling (SEM) method to validate the model. The integrative viewpoint implies that a successful telecare system is not only an information system but also a medical service provider/department to the patients/residents. The findings may be used as a theoretical basis for future research and can also offer empirical foresight to the executives and managers of hospitals when they initially introduce and promote the telecare systems into their surrounding community.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuki Shindo, Taiyou Kikuchi, Koichi Anada, S. Koka, T. Yaku
{"title":"Reduction of resolution for binary images by an octal grid graph representation model","authors":"Yuki Shindo, Taiyou Kikuchi, Koichi Anada, S. Koka, T. Yaku","doi":"10.1109/ICIS.2013.6607876","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607876","url":null,"abstract":"We deal with a data structure which is suitable for expression of the binary images. In general, binary images are expressed in raster data or rectangular dissections. In this paper, we describe that it is possible to reduce effectively the number of nodes in raster data represented by “octgrid” which is a type of octal grid graphs to handle heterogeneous rectangular dissections. Precisely, we propose algorithms to reduce the resolution of binary images represented by “octgrid”. Furthermore, we compare by examples our method with the Hilbert scanning, and show that our method reduces the rectangular number by less than 50% than the Hilbert scanning does, in several examples.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent technology for designing adaptive business processes","authors":"G. Rzevski","doi":"10.1109/ICIS.2013.6607821","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607821","url":null,"abstract":"Complexity of the Internet based global market is increasing relentlessly. To survive and prosper under new conditions business processes need to be adaptable, which means capable of positively reacting to frequent disruptions. A methodology and technology for designing adaptable business processes is outlined and examples are given of solutions supplied to commercial enterprises.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}