{"title":"Capabilities and Features: Linking Business and Application Architectures - I","authors":"S. Kamath","doi":"10.1109/WICSA.2011.12","DOIUrl":"https://doi.org/10.1109/WICSA.2011.12","url":null,"abstract":"Many organizations now perceive the importance of linking business architecture to information architecture, [1]. Without this linkage, it is difficult to manage the changes needed by the business and maximize the benefits from the information technology (IT) investments. Linking the two domains require that we define the two architectures using a \"common language\". The information architecture domain has developed tools and processes to define and represent the architecture, and use it to build the related processes and services. The business architecture domain, however, lacks such processes and tools and/or have not matured enough to be useful for linking of the two. In this paper we address several questions dealing with the linking of the business and the information/application architectures. Specifically, how do we define business architecture (useful for linking)? What level of details we need to represent? What view of the information architecture we should use for linking? How do we represent both these architectures and what \"language\" should we use? We propose the use Category theory related constructs and notions to represent both the business and information architecture [2]. The work reported here is primarily the current status of research in the area of business architecture,application architecture and linking these two.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132190410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Implementation of Interactive Web 3D Virtual Environment Using O3D","authors":"Kwang-Ho Seok, Yoon-Sang Kim","doi":"10.1109/ICISA.2011.5772378","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772378","url":null,"abstract":"This paper proposes an interactive Web 3D virtual experience environment based on O3D. A virtual experience hall was implemented with an educational goal of \"saving the earth from global warming.\" The interactive Web 3D virtual experience hall is capable of providing flexible services without being confined to a specific platform. A storytelling approach was employed to maximize the interactive experience, and the 3D environment was implemented using O3D to provide a user-oriented interface, as well as low-capacity, high-quality data services.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"31 11-12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120897831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung-Rye Son, T. Kuc, Jong-Koo Park, Hong-Seok Kim
{"title":"Simulation Based Functional and Performance Evaluation of Robot Components and Modules","authors":"Jung-Rye Son, T. Kuc, Jong-Koo Park, Hong-Seok Kim","doi":"10.1109/ICISA.2011.5772438","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772438","url":null,"abstract":"This paper presents a simulation based test method for functional and performance evaluation of robotic components and modules. In the proposed test method, function test procedure consists of unit, state, and interface tests which assess if the functional specifications of robot component 1 or module 2 are met. As for performance test, simulation environment provides a down scaled virtual work space for performance test of robot module accommodating virtual devices in conformity with the detailed performance specifications of real robot components. The proposed method can be used for verification of reliability of robot modules and components which prevents faults of them before their usage in real applications. In addition, the developed test system can be extended to support various test conditions implying possible cost saving for additional tests.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tri-Pool Dynamic Wear-Leveling Algorithm for Large Scale Flash Memory Storage Systems","authors":"Surafel Teshome, Tae-Sun Chung","doi":"10.1109/ICISA.2011.5772379","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772379","url":null,"abstract":"Because of the extra ordinary development in electronics technology, flash memories arise as a suitable data storage option for embedded systems. Due to the hardware restrictions and efficiency issues, series of researches has been conducted and are in progress to provide better performance for these devises. One of the popular research areas on flash memories is the state-of-art wear-leveling technique, which is used to distribute erase operations throughout blocks of flash memories, in order to avoid wearing of some blocks earlier than others. In this paper, we have proposed a tri-pool dynamic wear leveling algorithm which uses the method of neutralizing hot and cold blocks. The proposed algorithm mainly focuses on keeping erase counts of blocks as near as possible to the average erase count of the whole blocks; this will insure that no single block will have erase count much larger or lesser than the average. We also analytically prove that the newly proposed technique outperforms previous ones.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Categorization for Grouping Associative Items Mining in Item-Based Collaborative Filtering","authors":"Kyung-Yong Chung, Daesung Lee, Kuinam J. Kim","doi":"10.1109/ICISA.2011.5772335","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772335","url":null,"abstract":"Recommendation systems have been investigated and implemented in many aspects. Particularly, in case of collaborative filtering system, more important issue is how to manipulate the personalized recommendation results for better user understandability and satisfaction. Collaborative filtering system predicts items of interest for users based on predictive relationship discovered between the item and others. In this paper, the categorization for grouping associative items mining, for the purpose of improving accuracy and performance in the item-based collaborative filtering, is proposed. It is possible that, if the associative item is required to be simultaneously regrouped in all other groups in which they occur, the proposed method regrouped the associative items into the relevant group. In addition, the proposed method can result in improved predictive performance under the sparse data and cold-start circumstance that starts from small items in the collaborative filtering. And this method can increase the prediction accuracy and the scalability because of removing the noise generated by ratings on items of dissimilar content or interest. The approach is empirically evaluated for comparison with k-means, average link, and robust, using the MovieLens dataset. This method was found to significantly outperform the previous method.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blending of Socializing, Gaming and Information-Related Activities in Mobile Social Application Prototypes: Cues for Research, Design and Development","authors":"T. Ravindran, A. Chua, D. Goh","doi":"10.1109/ICISA.2011.5772413","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772413","url":null,"abstract":"Mobile social applications are becoming increasingly popular with a growing number of users turning to mobile devices for socializing, information sharing, retrieval or related activities, and/or gaming. The increased interest in the domain has resulted in numerous application prototypes being reported in the recent years that combine elements of socializing, gaming, and information related activities, powered by an ability to pinpoint user location, (location sensitivity), a feature touted to be a key characteristic of modern mobile applications. By varying the mix of one or few of the above elements, the prototypes are able to provide interesting and novel features and functionalities for their respective target user groups. In this paper, we provide an overview of sixteen research prototypes in the genre of mobile social applications reported in the last three years, followed by an analysis which reveals a trend towards designs that aim to provide higher levels of location sensitivity to support different shades of socializing, diverse information related functions and an assortment of embedded games.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116595162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient All-Digital Phase-Locked Loop with Input Fault Detection","authors":"Tin-Yam Yau, T. Caohuu, JeongHee Kim","doi":"10.1109/ICISA.2011.5772394","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772394","url":null,"abstract":"An all-digital phase-locked loop (ADPLL) having a fault detection of the input reference signal was modeled in Verilog hardware descriptive language (HDL) and is presented in this paper. The design can track an input signal with frequency ranging from 61kHz to 43MHz in a maximum locked-in time of five reference cycles. In the case of loss of input reference, it can continue to generate an output signal with the previously stored parameters and report the anomaly as status. The functional and timing requirements of the design were verified using Synopsys electronic design automation (EDA) tools. The ADPLL can be utilized as an intellectual property (IP) core to reduce the development time of an application-specified integrated circuit (ASIC) product. The input fault monitoring capability can provide operational feedback that improves the overall system reliability.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centroid Neural Network for Clustering of Line Segments","authors":"Dong-Chul Park, Dong-Min Woo, Yunsik Lee","doi":"10.1109/ICISA.2011.5772338","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772338","url":null,"abstract":"An approach for an efficient clustering of 3D line segments based on an unsupervised competitive neural network is applied to a set of high resolution satellite image data in this paper. The unsupervised competitive neural network, called centroid neural network for clustering 3D line segments (CNN-3D), utilizes the characteristics of 3D line segments. Successful application of CNN-3D can lead accurate extraction of rectangular boundaries for building rooftops from an 3-D edge image which is considered as challenging and difficult because 3-D line segments are often contaminated with various noises obtained during stereo matching process. Experiments and results show that the proposed CNN-3D algorithm can group 3D line segments and the resulting 3D line groups can be successfully utilized for detecting rectangular boundaries for building detection.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Development of Early Warning Model for Cyber Attack","authors":"So Jeong Kim, Soonjwa Hong","doi":"10.1109/ICISA.2011.5772414","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772414","url":null,"abstract":"To know and exactly what's going on in Cyberworld is impossible. Thus, it is also very hard to forecast what is going to happen and what will be the outcome of a certain event. Actually, every manipulating or exploiting of cyber resources is done without any recognition. Thus policy makers currently faces the daunting challenge of identifying the actors responsible for launching politically motivated cyber attacks. However, all human behaviors have a kind of patterns online and offline. This paper is trying to predict politically motivated cyber attack before that attack is happening with these patterns. It only applies to those politically motivated cyber attack because those patterns were motivated political will thus it shows more than technical signals. We've had lots of attacks from many sources without any reasonable purpose. Especially, ROK has been confronted DPRK since it's armistice in 1953. Cyberworld has been the most charming powers of DPRK which doesn't need any powerful and enormous economic and military effects. With this circumstances, we analyze the Moran Model of politically motivated cyber attack and put it 7.7 DDoS attack in 2009. Through this analysis, we try to have one possibility to predict what is going on the Cyberworld.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atipol Asavametha, Prashanth Ayyavu, Christopher Scaffidi
{"title":"No Application Is an Island: Using Topes to Transform Strings during Data Transfer","authors":"Atipol Asavametha, Prashanth Ayyavu, Christopher Scaffidi","doi":"10.1109/ICISA.2011.5772325","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772325","url":null,"abstract":"Users and programmers frequently need to move information between applications, including desktop and web applications. Transferring data often involves reformatting strings such as phone numbers or extracting parts from them, but actually performing these transformations typically requires tedious, error-prone operations. For example, programmers must write messy code to parse and reformat strings passed between web services, while ordinary end users must manually reformat strings that they want to copy-paste between applications. In this paper, we show at an architectural level how topes can be used to smooth the flow of data between applications by automatically transforming strings on demand. We have demonstrated the generality and usefulness of this approach by using topes to automatically transform data moving between applications, web sites and web services, thereby showing how topes can make it simpler for both end users and programmers to transfer information between applications.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129867204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}