{"title":"Improving QoS of VoWLAN via Cross-Layer-Based Adaptive Approach","authors":"S. A. A. Alshakhsi, H. Hasbullah","doi":"10.1109/ICISA.2011.5772426","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772426","url":null,"abstract":"The next generation technology of Voice over Internet Protocol (VoIP) allows voice to be delivered over the Internet Protocol based networks. The integration of VoIP and Wireless Local Area Network (WLAN) has become popular. However, WLAN architecture was primarily designed to carry data and not for real-time applications, such as VoIP. Hence, there is a need to enhance the quality of VoIP transmission over the WLAN. On the other hand, IEEE 802.11 standard of WLAN provides support to link adaptive (LA) technique. LA leads to multi-rate transmissions, which causes degradation on voice quality. In this paper, cross-layer based adaptive approach is proposed to improve the quality of voice delivery over WLAN by minimizing the multi-rate effects on the quality of service (QoS) of VoIP. The approach in achieving this is by introducing a communication agent between MAC sub-layer and Application layer, by which congestion caused by the multi-rate could be reduced, if not eliminated. Moreover, Encoder adaptation is utilized at the Application layer as codec parameters are adapted according to the change of rate occurs at the MAC sub-layer. Simulation of different scenarios for different codec rates at different transmission rates has been implemented using OPNET. The result of QoS improvements is the evidence for the proposed cross-layer adaptation approach.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Estimation of Trajectories and Heights of Pedestrians","authors":"Sangwoo Park, Tae-eun Kim, Jongsoo Choi","doi":"10.1109/ICISA.2011.5772407","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772407","url":null,"abstract":"In recent years, there has been increased interest in characterizing and extracting 3D information from video sequences for object tracking and identification. In this paper, we propose a single view-based framework for robust estimation of height and position. In this work, 2D features of a target object is back-projected into the 3D scene space where its coordinate system is given by a rectangular marker. Then the position and height are estimated in the 3D scene space. In addition, geometric error caused by an inaccurate projective mapping is corrected by using geometric constraints provided by the marker. The proposed framework is entirely non-iterative, and therefore is very fast. As the proposed framework uses a single camera, it can be directly embedded into conventional monocular camera-based surveillance/security systems. The accuracy and robustness of the proposed technique are verified on the experimental results of several real video sequences taken from outdoor environments.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-Driven Visualization System for Semantic Search","authors":"Inay Ha, Kyeong-Jin Oh, Geun-Sik Jo","doi":"10.1109/ICISA.2011.5772374","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772374","url":null,"abstract":"Abstract-Technical manuals are very diverse, ranging from manuals on software to manuals on commodities, general instructions and technical manuals that deal with specific domains such as mechanical maintenance. Due to the vast amount of manual information finding the necessary information is quite difficult. In case of electronic maintenance manuals currently used by companies, mechanics should search for the related information to accomplish their tasks. And it is difficult to grasp relationships among contents in manuals. Search process is time-consuming and laborious for mechanics. Many researchers have adopted ontology to solve these problems and semantically represent contents of manuals. However if ontology becomes very large and complex, it is not easy to work with ontology. Visualization has been an effective way to grasp and manipulate ontology. In this research, we model new ontology to represent and retrieve contents of manuals and design the visualization system based on proposed ontology. To model ontology, we analyzed aircraft maintenance process, extracted concepts and defined relationships between concepts. After modeling, we created instances of each class using technical manuals. Our system visualizes related information so that mechanics can intuitively grasp the information. This allows workers to easily get information for given tasks and to reduce their time to search related information. Also, related information can be understood at a time through visualization.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Goal-Scenario Based Diagnosis Agent for Business Activity Monitoring","authors":"Su-Jin Baek, Jong-Won Ko, Young-Jae Song","doi":"10.1109/ICISA.2011.5772317","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772317","url":null,"abstract":"The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. The Enhydra Shark from the existing WfMS shows the process records on the web client by the allocated activities during the designing process of the process log for the sake of the process monitoring. In WfMOpen, the documentation on the definition of the process is complication and insufficient, and there is no interacting part with other work flow services. Therefore, it rather provides services in accordance with the process result information that was allocated during the previous designing, rather than the monitoring of the changes by the influence of the external environment. In this paper we propose a system, which can interpret and monitoring to the result of each business acts follows in change of external environment. The proposed system applies a meta-heuristic genetic algorithms which to reduce additional load and to acquire the accuracy of system information. In addition, the similarity with the activities, dependency, and correlation are examined to find similar process model, and then the relevancy is extracted by using the event property information. Such information is used to figure out the problems occurring as a result of the changes and provide diagnostic information to support the adaptation decision making. With this, it is possible to apply the judgment of the situation info of the users as it occurs in a dynamic context.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131078111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source","authors":"Hong-bin Yim, Taewon Kim, Jaeil Jung","doi":"10.1109/ICISA.2011.5772420","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772420","url":null,"abstract":"DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection algorithm to trace the attacker's real origin. This algorithm uses three types of packets such as an alert packet, an agent packet and a reply agent packet. The alert packet is in use to notify to a victim that DDoS attacks occur. The agent packet is in use to find the attacker's real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. When source-end detector and victim-end detector detect attacks, the victim-end detector sends the alert packet to the victim. The victim received the alert packet generates the agent packet and sends it to a victim's edge router. The attacker's edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table by routers. The probabilistic route selection algorithm runs on the distributed routers and probabilistic packet forwarding table is stored and managed by routers. We simulate for the propose of validation this algorithm by using OPNET14.0 in terms of false positive and required number of packets to trace DDoS attack traffic source.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125329701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyuk-Soo Jang, Dong-Chul Lee, Seok-Yeul Yun, Jong-Oh Kim, Chong-Il Ahn, Hyo-Sik Yang
{"title":"Condition Monitoring and Diagnosis for IEC 61850 Based Power Systems","authors":"Hyuk-Soo Jang, Dong-Chul Lee, Seok-Yeul Yun, Jong-Oh Kim, Chong-Il Ahn, Hyo-Sik Yang","doi":"10.1109/ICISA.2011.5772341","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772341","url":null,"abstract":"The CMD (Condition Monitoring Diagnosis) which diagnoses power grid health status has been one of the major issues in power grid to improve the reliability of the power system by preventing a potential failure in advance. Since too many different CMD techniques in various forms from many vendors are currently used, they need to be standardized. IEC 61850 shall be used to communicate with the condition monitoring equipment. A seamless communication with the sensor network shall be achieved as well.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Uncertain Risk Index Model for Multi-Period Portfolio Selection","authors":"Xiaoxia Huang, L. Qiao","doi":"10.1109/ICISA.2011.5772314","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772314","url":null,"abstract":"This paper discusses a multi-period portfolio problem in the situation where security returns are given mainly by experts' judgment and evaluation. The security return rates are regarded as uncertain variables in the situation and the justification of using them is discussed. An uncertain adjusting Risk Index model is proposed in which optimal portfolio adjustments are determined with the objective of minimizing a cumulative Risk Index over the investment horizon, while satisfying self-financing constraints at each period and achieving a desired incremental wealth target. The adjusting model is converted into its crisp form, enabling the users to effectively solve the multi-period adjusting problem with currently available programming solvers. For the sake of illustration, an example is also provided.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Multimedia Applications Using Intel Threading Building Blocks on Multi-Core Processors","authors":"Cheong-Ghil Kim","doi":"10.1109/ICISA.2011.5772423","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772423","url":null,"abstract":"The recent development on semiconductor process and design technologies enables multi-core processors to become a dominant market trend in desk-top PCs as well as high end mobile devices. At the same time, the increasing popularity of high quality digital contents processing makes processors to quip with dedicated instructions based on sub-word parallelism in order to process streaming data. This paper presents a way of optimizations of 2D convolution operator, a widely used technique in image and signal processing applications, on speed in Intel multi-core processors. Two optimization techniques are discussed in detail. One is the streaming SIMD (Single Instruction Multiple Data) extension (SSE) technology, available in Intel processors, for data parallelism. The other is the Intel TBB (Threading Building Block) run-time library to exploit parallelism in task level. As a result, this paper can investigate the advantage of two different parallelisms, both data and task, concurrently. For the performance evaluation, we implemented Sobel operator using SSE and TBB with different combinations and compared their processing speeds. The results show that both technologies have a significant effect on the performance and the processing speed can be greatly improved when using two technologies at the same time.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122510817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soodeh Farokhi, A. Ghaffari, A. Nikravesh, F. Shams
{"title":"A Model Driven Framework to Compose Heterogeneous Services","authors":"Soodeh Farokhi, A. Ghaffari, A. Nikravesh, F. Shams","doi":"10.1109/ICISA.2011.5772398","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772398","url":null,"abstract":"In order to better comply to new requirements or quick adjustment with changing requirements, service composition is used in the way of exploiting the capability of available services. Service composition is one of the most benefits of SOA. Since emerging of RESTful web services, the needs for heterogeneous composition have been raised and brought up new challenges. On the other hand, service composition is a complex process. Therefore, to cope with all mentioned problems, a novel framework has been proposed in this paper. The aim of this framework is composing heterogeneous services semi automatically in a model driven fashion.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124636270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration Technology of Literature Contents Based on SaaS","authors":"Jungsoo Han, Gui-Jung Kim","doi":"10.1109/ICISA.2011.5772387","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772387","url":null,"abstract":"Applications based on SaaS platform have been appeared as services for common users and enterprise users and an integration management of literature contents of libraries in the country is needed in the future. SaaS based literature contents integration has not been done here yet. Therefore, this paper presents SaaS based technology which integrates literature contents of public organizations or libraries and manages. It designed a SaaS technology applying method and a literature contents framework for literature contents service and utilized METS and MODS for the format standard.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}