2011 International Conference on Information Science and Applications最新文献

筛选
英文 中文
Capabilities and Features: Linking Business and Application Architectures - I 功能和特性:连接业务和应用程序架构- 1
2011 International Conference on Information Science and Applications Pub Date : 2011-06-20 DOI: 10.1109/WICSA.2011.12
S. Kamath
{"title":"Capabilities and Features: Linking Business and Application Architectures - I","authors":"S. Kamath","doi":"10.1109/WICSA.2011.12","DOIUrl":"https://doi.org/10.1109/WICSA.2011.12","url":null,"abstract":"Many organizations now perceive the importance of linking business architecture to information architecture, [1]. Without this linkage, it is difficult to manage the changes needed by the business and maximize the benefits from the information technology (IT) investments. Linking the two domains require that we define the two architectures using a \"common language\". The information architecture domain has developed tools and processes to define and represent the architecture, and use it to build the related processes and services. The business architecture domain, however, lacks such processes and tools and/or have not matured enough to be useful for linking of the two. In this paper we address several questions dealing with the linking of the business and the information/application architectures. Specifically, how do we define business architecture (useful for linking)? What level of details we need to represent? What view of the information architecture we should use for linking? How do we represent both these architectures and what \"language\" should we use? We propose the use Category theory related constructs and notions to represent both the business and information architecture [2]. The work reported here is primarily the current status of research in the area of business architecture,application architecture and linking these two.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Implementation of Interactive Web 3D Virtual Environment Using O3D 基于O3D的交互式Web三维虚拟环境的实现研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772378
Kwang-Ho Seok, Yoon-Sang Kim
{"title":"A Study on Implementation of Interactive Web 3D Virtual Environment Using O3D","authors":"Kwang-Ho Seok, Yoon-Sang Kim","doi":"10.1109/ICISA.2011.5772378","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772378","url":null,"abstract":"This paper proposes an interactive Web 3D virtual experience environment based on O3D. A virtual experience hall was implemented with an educational goal of \"saving the earth from global warming.\" The interactive Web 3D virtual experience hall is capable of providing flexible services without being confined to a specific platform. A storytelling approach was employed to maximize the interactive experience, and the 3D environment was implemented using O3D to provide a user-oriented interface, as well as low-capacity, high-quality data services.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"31 11-12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120897831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation Based Functional and Performance Evaluation of Robot Components and Modules 基于仿真的机器人部件与模块功能与性能评估
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772438
Jung-Rye Son, T. Kuc, Jong-Koo Park, Hong-Seok Kim
{"title":"Simulation Based Functional and Performance Evaluation of Robot Components and Modules","authors":"Jung-Rye Son, T. Kuc, Jong-Koo Park, Hong-Seok Kim","doi":"10.1109/ICISA.2011.5772438","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772438","url":null,"abstract":"This paper presents a simulation based test method for functional and performance evaluation of robotic components and modules. In the proposed test method, function test procedure consists of unit, state, and interface tests which assess if the functional specifications of robot component 1 or module 2 are met. As for performance test, simulation environment provides a down scaled virtual work space for performance test of robot module accommodating virtual devices in conformity with the detailed performance specifications of real robot components. The proposed method can be used for verification of reliability of robot modules and components which prevents faults of them before their usage in real applications. In addition, the developed test system can be extended to support various test conditions implying possible cost saving for additional tests.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Tri-Pool Dynamic Wear-Leveling Algorithm for Large Scale Flash Memory Storage Systems 大规模闪存存储系统的三池动态耗损均衡算法
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772379
Surafel Teshome, Tae-Sun Chung
{"title":"A Tri-Pool Dynamic Wear-Leveling Algorithm for Large Scale Flash Memory Storage Systems","authors":"Surafel Teshome, Tae-Sun Chung","doi":"10.1109/ICISA.2011.5772379","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772379","url":null,"abstract":"Because of the extra ordinary development in electronics technology, flash memories arise as a suitable data storage option for embedded systems. Due to the hardware restrictions and efficiency issues, series of researches has been conducted and are in progress to provide better performance for these devises. One of the popular research areas on flash memories is the state-of-art wear-leveling technique, which is used to distribute erase operations throughout blocks of flash memories, in order to avoid wearing of some blocks earlier than others. In this paper, we have proposed a tri-pool dynamic wear leveling algorithm which uses the method of neutralizing hot and cold blocks. The proposed algorithm mainly focuses on keeping erase counts of blocks as near as possible to the average erase count of the whole blocks; this will insure that no single block will have erase count much larger or lesser than the average. We also analytically prove that the newly proposed technique outperforms previous ones.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Categorization for Grouping Associative Items Mining in Item-Based Collaborative Filtering 基于项的协同过滤中分组关联项挖掘的分类
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772335
Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim
{"title":"Categorization for Grouping Associative Items Mining in Item-Based Collaborative Filtering","authors":"Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim","doi":"10.1109/ICISA.2011.5772335","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772335","url":null,"abstract":"Recommendation systems have been investigated and implemented in many aspects. Particularly, in case of collaborative filtering system, more important issue is how to manipulate the personalized recommendation results for better user understandability and satisfaction. Collaborative filtering system predicts items of interest for users based on predictive relationship discovered between the item and others. In this paper, the categorization for grouping associative items mining, for the purpose of improving accuracy and performance in the item-based collaborative filtering, is proposed. It is possible that, if the associative item is required to be simultaneously regrouped in all other groups in which they occur, the proposed method regrouped the associative items into the relevant group. In addition, the proposed method can result in improved predictive performance under the sparse data and cold-start circumstance that starts from small items in the collaborative filtering. And this method can increase the prediction accuracy and the scalability because of removing the noise generated by ratings on items of dissimilar content or interest. The approach is empirically evaluated for comparison with k-means, average link, and robust, using the MovieLens dataset. This method was found to significantly outperform the previous method.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Blending of Socializing, Gaming and Information-Related Activities in Mobile Social Application Prototypes: Cues for Research, Design and Development 手机社交应用原型中社交、游戏和信息相关活动的融合:研究、设计和开发的线索
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772413
T. Ravindran, A. Chua, D. Goh
{"title":"Blending of Socializing, Gaming and Information-Related Activities in Mobile Social Application Prototypes: Cues for Research, Design and Development","authors":"T. Ravindran, A. Chua, D. Goh","doi":"10.1109/ICISA.2011.5772413","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772413","url":null,"abstract":"Mobile social applications are becoming increasingly popular with a growing number of users turning to mobile devices for socializing, information sharing, retrieval or related activities, and/or gaming. The increased interest in the domain has resulted in numerous application prototypes being reported in the recent years that combine elements of socializing, gaming, and information related activities, powered by an ability to pinpoint user location, (location sensitivity), a feature touted to be a key characteristic of modern mobile applications. By varying the mix of one or few of the above elements, the prototypes are able to provide interesting and novel features and functionalities for their respective target user groups. In this paper, we provide an overview of sixteen research prototypes in the genre of mobile social applications reported in the last three years, followed by an analysis which reveals a trend towards designs that aim to provide higher levels of location sensitivity to support different shades of socializing, diverse information related functions and an assortment of embedded games.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116595162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient All-Digital Phase-Locked Loop with Input Fault Detection 具有输入故障检测的高效全数字锁相环
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772394
Tin-Yam Yau, T. Caohuu, JeongHee Kim
{"title":"An Efficient All-Digital Phase-Locked Loop with Input Fault Detection","authors":"Tin-Yam Yau, T. Caohuu, JeongHee Kim","doi":"10.1109/ICISA.2011.5772394","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772394","url":null,"abstract":"An all-digital phase-locked loop (ADPLL) having a fault detection of the input reference signal was modeled in Verilog hardware descriptive language (HDL) and is presented in this paper. The design can track an input signal with frequency ranging from 61kHz to 43MHz in a maximum locked-in time of five reference cycles. In the case of loss of input reference, it can continue to generate an output signal with the previously stored parameters and report the anomaly as status. The functional and timing requirements of the design were verified using Synopsys electronic design automation (EDA) tools. The ADPLL can be utilized as an intellectual property (IP) core to reduce the development time of an application-specified integrated circuit (ASIC) product. The input fault monitoring capability can provide operational feedback that improves the overall system reliability.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Centroid Neural Network for Clustering of Line Segments 线段聚类的质心神经网络
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772338
Dong-Chul Park, Dong-Min Woo, Yunsik Lee
{"title":"Centroid Neural Network for Clustering of Line Segments","authors":"Dong-Chul Park, Dong-Min Woo, Yunsik Lee","doi":"10.1109/ICISA.2011.5772338","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772338","url":null,"abstract":"An approach for an efficient clustering of 3D line segments based on an unsupervised competitive neural network is applied to a set of high resolution satellite image data in this paper. The unsupervised competitive neural network, called centroid neural network for clustering 3D line segments (CNN-3D), utilizes the characteristics of 3D line segments. Successful application of CNN-3D can lead accurate extraction of rectangular boundaries for building rooftops from an 3-D edge image which is considered as challenging and difficult because 3-D line segments are often contaminated with various noises obtained during stereo matching process. Experiments and results show that the proposed CNN-3D algorithm can group 3D line segments and the resulting 3D line groups can be successfully utilized for detecting rectangular boundaries for building detection.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Development of Early Warning Model for Cyber Attack 网络攻击预警模型开发研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772414
So Jeong Kim, Soonjwa Hong
{"title":"Study on the Development of Early Warning Model for Cyber Attack","authors":"So Jeong Kim, Soonjwa Hong","doi":"10.1109/ICISA.2011.5772414","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772414","url":null,"abstract":"To know and exactly what's going on in Cyberworld is impossible. Thus, it is also very hard to forecast what is going to happen and what will be the outcome of a certain event. Actually, every manipulating or exploiting of cyber resources is done without any recognition. Thus policy makers currently faces the daunting challenge of identifying the actors responsible for launching politically motivated cyber attacks. However, all human behaviors have a kind of patterns online and offline. This paper is trying to predict politically motivated cyber attack before that attack is happening with these patterns. It only applies to those politically motivated cyber attack because those patterns were motivated political will thus it shows more than technical signals. We've had lots of attacks from many sources without any reasonable purpose. Especially, ROK has been confronted DPRK since it's armistice in 1953. Cyberworld has been the most charming powers of DPRK which doesn't need any powerful and enormous economic and military effects. With this circumstances, we analyze the Moran Model of politically motivated cyber attack and put it 7.7 DDoS attack in 2009. Through this analysis, we try to have one possibility to predict what is going on the Cyberworld.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
No Application Is an Island: Using Topes to Transform Strings during Data Transfer 没有应用程序是孤岛:在数据传输过程中使用Topes转换字符串
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772325
Atipol Asavametha, Prashanth Ayyavu, Christopher Scaffidi
{"title":"No Application Is an Island: Using Topes to Transform Strings during Data Transfer","authors":"Atipol Asavametha, Prashanth Ayyavu, Christopher Scaffidi","doi":"10.1109/ICISA.2011.5772325","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772325","url":null,"abstract":"Users and programmers frequently need to move information between applications, including desktop and web applications. Transferring data often involves reformatting strings such as phone numbers or extracting parts from them, but actually performing these transformations typically requires tedious, error-prone operations. For example, programmers must write messy code to parse and reformat strings passed between web services, while ordinary end users must manually reformat strings that they want to copy-paste between applications. In this paper, we show at an architectural level how topes can be used to smooth the flow of data between applications by automatically transforming strings on demand. We have demonstrated the generality and usefulness of this approach by using topes to automatically transform data moving between applications, web sites and web services, thereby showing how topes can make it simpler for both end users and programmers to transfer information between applications.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129867204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信