A. Khattak, Zeeshan Pervez, Sungyoung Lee, Young-Koo Lee
{"title":"After Effects of Ontology Evolution","authors":"A. Khattak, Zeeshan Pervez, Sungyoung Lee, Young-Koo Lee","doi":"10.1109/FUTURETECH.2010.5482765","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482765","url":null,"abstract":"Use of ontology in Information Systems and Knowledge Sharing Systems are increasing that gives more importance to proper maintenance of these ontologies in use. Ontology change management is a collaborative process that incorporate areas like; ontology engineering, evolution versioning, merging, integration, and maintenance. As experts develop better understanding of the domain, incorporate changes accordingly to the body of knowledge, as a result the body of knowledge evolves from one state to another. Preserving consistency while accommodating changes is a crucial task that needs special attention. In this paper we provide a brief review of state of the art in the field of ontology evolution that set the stage for the unfolded challenges in ontology evolution to complete the process automatically. Then we also discuss very important issues that need special attention to minimize the after effects of ontology evolution.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang-Wu Yu, Wen Ouyang, C. Wang, Meng-Ti Liu, Yu-Wei Chang
{"title":"Graph Model for OVSF Code Placement","authors":"Chang-Wu Yu, Wen Ouyang, C. Wang, Meng-Ti Liu, Yu-Wei Chang","doi":"10.1109/FUTURETECH.2010.5482700","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482700","url":null,"abstract":"The orthogonal variable-spreading-factor (OVSF)-CDMA systems can support multimedia applications with different bandwidth requirements. Code management schemes, including code placement and replacement, significantly impact the code utilization of the system. Many researches have studied these two closely related problems and are solving them independently. For replacement, the optimality concerns the minimization of the reassignment number. There is no definition about the placement optimality yet. We formally define the placement optimality for code placement schemes and presented a novel graph model, constrained independent dominating set problem (CIDP), which is proved to be NP-complete for general graphs. A unified algorithm is provided to firstly address both OVSF code placement and replacement issues at the same time which achieves placement optimality in linear time complexity. This demonstrated that OVSF code placement optimality problem is in P. Another simple and practical unified solution is presented and is shown to be reasonably effective.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saleh Ali K. Al-Omari, P. Sumari, Sadik A. M. Al-Taweel
{"title":"Peer to Peer Media Streaming System: A/V Conferencing System Using Custom Protocol","authors":"Saleh Ali K. Al-Omari, P. Sumari, Sadik A. M. Al-Taweel","doi":"10.1109/FUTURETECH.2010.5482693","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482693","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hui-Hung Chien, Jian-Ming Chang, Hsiang-Te Liu, H. Chao
{"title":"Design a Novel Scheme for Dual-Stack Cloud File Service Discovery Based on Distributed Hash Table","authors":"Hui-Hung Chien, Jian-Ming Chang, Hsiang-Te Liu, H. Chao","doi":"10.1109/FUTURETECH.2010.5482666","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482666","url":null,"abstract":"Cloud services attract some attention in recent years, the information connection devices of organizations or enterprises with one another distributed around the world using networking systems. Cloud services also provide variety services for users, including virtual hosting services, storage services and web application services, etc. Because of the rise of cloud computing, users can directly enjoy the benefits of distributed computing. The high throughput of computing power and large storage space can be ubiquitous when users connect to the Internet. Two important elements behind clouds computing include distributed computing and peer-to-peer network. However, the huge numbers of information devices today bring forth some new problems. The lack of IPv4 protocol addresses is one of the serious problems. Therefore, the IPv6 protocol was proposed, and during the transitional period form pure IPv4 to pure IPv6, IPv4 and IPv6 will coexist in the Internet. To link independent dual-stack p2p networks around the world, we hereby propose a mechanism to improve the service discovery in dual-stack cloud file service in hope of decreasing the count of protocol translation so as to improve the efficiency of the bandwidth and load balance.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. K. Jha, Ankita Jain, M. Pattanaik, A. Srivastava
{"title":"Performance Analysis of NMOS for Higher Speed and Low Power Applications","authors":"K. K. Jha, Ankita Jain, M. Pattanaik, A. Srivastava","doi":"10.1109/FUTURETECH.2010.5482680","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482680","url":null,"abstract":"Integrated circuits based on low supply voltage and subthreshold operations of NMOS devices are very attractive for low power applications. An effective way to reduce supply voltage and resulting in power consumption without losing the circuit performance of NMOS is to increase the drive current of NMOS. This paper reports the scaling analysis of NMOS from deep-submicron to nanometer technologies, in which channel length has been scaled down from 600nm to 90nm. For simulation, ATLAS device simulator is used, by using the models LAMBARDI (CVT) mobility model and fixed Shockley-read-hall model recombination model. Simulation result depicts that threshold voltage is 0.26V at 600nm, 0.04V at 180nm and 0.01V at 90nm so nanometer range NMOS devices can be very attractive for low power and subthreshold operations.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effects of Financial Crises on American Financial Institutions Information Security","authors":"Cliff Knopik, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482633","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482633","url":null,"abstract":"Information Security Professionals must be flexible and adapt to an ever changing environment. The financial industry in particular offers many unique challenges for information security as technology is often quickly adopted and governments regulations fluctuate and change. These challenges can be especially complicated during financial crises. In order for both information security professionals and financial industry professionals to more efficiently navigate through trying times I have compiled and surveyed a historical list of financial crises in America. This survey gives a good overall picture of the trends happening due to financial crises and their effects on the financial industry. The crisis which began in December 2007 is then looked at. Comparing past financial crises with the crisis starting in December 2007 I forecast more stringent legal and regulatory changes will be forthcoming which will affect information security. I then offer ideas on how a pro-active organization can pre-empt these potentially burdensome changes by self-regulating their information security and combining various industry accepted IT standards before legal regulatory changes are enacted.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Traditional Software Engineering Tools to Ontology Engineering under a New Methodology","authors":"Santhosh John","doi":"10.1109/FUTURETECH.2010.5482657","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482657","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proactive Approach to Detecting and Reducing Information Security Threats in Billing Systems","authors":"Dustin Erhardt, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482636","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482636","url":null,"abstract":"A billing system consists of many components that allow an end user to be able to add, view, print, or perform normal billing operations. These components can be in the form of servers, desktops, laptops, routers, firewalls, printers, and other appliances. All of these components connect together in some form to make up the complete billing system. The security of the whole billing system is reliant on the security of each individual component and process. Using a well managed and thorough vulnerability management system, the security of each of these components can drastically be increased. By mitigating the vulnerabilities that exist on each individual component, the vulnerabilities and security holes in the system can be greatly reduced.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Key Management Scheme in Sensor Network","authors":"Hye-young Kim, Y. Jeong","doi":"10.1109/FUTURETECH.2010.5482661","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482661","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hixosfs for Ubiquitous Commerce through Bluetooth","authors":"N. Corriero, Eustrat Zhupa","doi":"10.1109/FUTURETECH.2010.5482746","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482746","url":null,"abstract":"Hixosfs is a Linux filesystem designed to easily cataloging and retriving files according final user selected metadata. The idea is the use of bluetooth technology to create an ad-hoc indoor network managed by hixosfs. The system has been implemented using embedded systems linked to each other using bluetooth connection or an ad-hoc wireless network. In each of these, a hixosfs filesystem based database has been used to improve the performance.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}