2011 International Conference on Information Science and Applications最新文献

筛选
英文 中文
Frequency Monitoring for Wide-Area Power Grid Protection 广域电网保护的频率监测
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772386
J. Ko, Chul-Won Park, Dong-Kwang Shin, Chul-Hwan Kim, Hak-Man Kim, Yoon-Sang Kim
{"title":"Frequency Monitoring for Wide-Area Power Grid Protection","authors":"J. Ko, Chul-Won Park, Dong-Kwang Shin, Chul-Hwan Kim, Hak-Man Kim, Yoon-Sang Kim","doi":"10.1109/ICISA.2011.5772386","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772386","url":null,"abstract":"There have been recent research activities on GPS-based FNET to prevent wide-area blackouts by monitoring frequency deviation. This study developed a system for monitoring regional frequencies in power grid modeling as an advanced research project for implementing intelligent wide-area protective relaying. The system was implemented by modeling an actual 345 kV transmission system using EMTP-RV and by measuring voltages and currents at 5 regions. The frequencies were estimated with a frequency estimation algorithm using gain compensation. The monitoring software implemented by this study was used to visualize frequency propagation effects and review simulation processes in various failure conditions.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114719264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AgentSpeak(PL): A New Programming Language for BDI Agents with Integrated Bayesian Network Model AgentSpeak(PL):一种集成贝叶斯网络模型的BDI代理编程语言
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5930301
Diego Silva, J. Gluz
{"title":"AgentSpeak(PL): A New Programming Language for BDI Agents with Integrated Bayesian Network Model","authors":"Diego Silva, J. Gluz","doi":"10.1109/ICISA.2011.5930301","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5930301","url":null,"abstract":"Within the current BDI paradigm of agent oriented programming, it is not possible to develop a practical and straightforward software when agent's beliefs are based on probabilistic knowledge related to their environment, because the logical base of the programming language do not allow this possibility. Usually, to develop this kind of hybrid agent, it is necessary to make use of advanced programming techniques, which combine and integrate different development environments and programming languages in order to represent the logical part and the probabilistic part of the model, to make implementation feasible. This work presents a new agentoriented programming language called AgentSpeak(PL), based in AgentSpeak(L), a classical BDI programming language. AgentSpeak(PL) integrates the concept of probabilistic beliefs through the use of Bayesian Networks, to core BDI programming concepts. The language is implemented through an extension of the Jason programming environment.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
WiMAX Network for Health Care Telemonitoring Service 用于医疗保健远程监控服务的WiMAX网络
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772362
Yun-Sheng Yen, Wen-Chen Chiang, Hsiang-Yu Wang, Chwan-Yi Shiah
{"title":"WiMAX Network for Health Care Telemonitoring Service","authors":"Yun-Sheng Yen, Wen-Chen Chiang, Hsiang-Yu Wang, Chwan-Yi Shiah","doi":"10.1109/ICISA.2011.5772362","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772362","url":null,"abstract":"The inconvenience of transportation frequently causes delay in health care for home-dwelling patients with chronic diseases, resulting in inequality of medical care. This paper proposes a Telemonitoring System (WiMAX Telemonitoring Service) framework for monitoring and delivering health care service to home-dwelling chronic hypertension patients, with the idea of improving the accessibility of medical care by utilizing the benefits of Internet to construct a ubiquitous health care environment. The study compared and analyzed three wireless Networks: WiMAX, WiFi and HSDPA, and found that WiMAX has the best performance regarding to stability as a long-distance health care delivery platform. A questionnaire survey in the hospital also revealed that the medical staff are highly recognized with telemedicine, which supports and serves as a reference for the designing of the telemonitoring system.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Study on Improvement of the Evidence Collection Module in Windows Forensic Windows取证取证模块的改进研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772391
W. Park, Donghwi Lee, Kuinam J. Kim
{"title":"A Study on Improvement of the Evidence Collection Module in Windows Forensic","authors":"W. Park, Donghwi Lee, Kuinam J. Kim","doi":"10.1109/ICISA.2011.5772391","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772391","url":null,"abstract":"Recently, A malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection modules do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing evidence collection module and suggests new ways to improve those problems.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132729250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on Network Security Protocol to Defend against Fragmented Packet Attacks Using Biometrics 基于生物特征的网络安全协议防御分片报文攻击研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772416
Daesung Lee, Kuinam J. Kim, K. Kim
{"title":"A Study on Network Security Protocol to Defend against Fragmented Packet Attacks Using Biometrics","authors":"Daesung Lee, Kuinam J. Kim, K. Kim","doi":"10.1109/ICISA.2011.5772416","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772416","url":null,"abstract":"With rapid advancement of internet and web technology, damage from phishing has been increasing. To meet this issue, network authentication protocol with security implementation has been extensively studied. Single authentication such as password identification requires the authentication upon login, and session might be interrupted by ill-intentioned user once session is accomplished. Authentication method for fragmented packet is proposed to block the fragmented network attack. To prevent communication overload from the insertion of additional authentication information, the corresponding information is inserted to identifier for IP header, and packet size is controlled.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensibility Ergonomics Design Recommendation System Using Weather WebBot 基于Weather WebBot的感性人机工程设计推荐系统
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772371
Kyung-Yong Chung
{"title":"Sensibility Ergonomics Design Recommendation System Using Weather WebBot","authors":"Kyung-Yong Chung","doi":"10.1109/ICISA.2011.5772371","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772371","url":null,"abstract":"Analysis of a customer's sensibility and preferences is an important strategy in a market that is becoming increasingly more customer oriented. In this paper, we propose the sensibility ergonomics design recommendation system using weather Web-Bot (DRS-WB). The proposed method applies sensibility ergo-nomics to increase the efficiency of merchandising for human-oriented sensible product designs. Development of DRS-WB used a user interface and collaborative filtering for the textile and fashion designs in order to satisfy the user's needs. Collaborative filtering was adopted in order to recommend designs of interest for users based on the predictive relationship discovered between the current user and other previous users. The today weather information is simultaneously acquired from the sensor based smartwear and the weather WebBot (Web Robot Agent). The weather WebBot uses a database of weather forecast information extracted from the web pages and RSS of the Korea Meteorologi-cal Administration and collects information from the various links off the main URL. And its signals are transmitted to the connected DRS-WB. It can be easily monitored in real time. We used 60 textile designs and 41 fashion designs in the survey ques-tionnaire. The composition of the questionnaire is 17 sections for 6 designs on a page. 2,830,020 ratings were collected from 1,401 users. The pictures of fashion design details, such as collar type, sleeve type, skirt type, skirt length, and color tone were evaluated in terms of sensibility. Ultimately, this paper suggests empirical applications to verify the adequacy and the validity of this system.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131297056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-Modal CAPTCHA: A User Verification Scheme 多模式验证码:一种用户验证方案
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772421
A. Almazyad, Yasir Ahmad, Shouket Ahmad Kouchay
{"title":"Multi-Modal CAPTCHA: A User Verification Scheme","authors":"A. Almazyad, Yasir Ahmad, Shouket Ahmad Kouchay","doi":"10.1109/ICISA.2011.5772421","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772421","url":null,"abstract":"CAPTCHA is an automated test that humans can pass, but current computer programs can't pass any program that has high success over a CAPTCHA can be used to solve an unsolved Artificial Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these text-based schemes have found widespread applications in commercial websites like free email service providers, social networking sites and online auction sites. The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized; accordingly we make an approach to build our CAPTCHA method. Considering the case study results and including other points which may pose difficulty for the OCR systems,we proposed a new technique to build a CAPTCHA which is multi-modal (Picture and Text based). An image is being rendered on the screen and many text labels drawn over it. A user has to identify the correct name of the underlying image among the set of text labels that are scattered over it, in order to pass a human verification test. We also proposed to use cursive text instead of plain text labels.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"25 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Prototype Analysis of OTP Key-Generation Based on Mobile Device Using Voice Characteristics 基于语音特征的移动设备OTP密钥生成原型分析
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772393
Byung-Rae Cha, Nam-Yeoung Kim, JongWon Kim
{"title":"Prototype Analysis of OTP Key-Generation Based on Mobile Device Using Voice Characteristics","authors":"Byung-Rae Cha, Nam-Yeoung Kim, JongWon Kim","doi":"10.1109/ICISA.2011.5772393","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772393","url":null,"abstract":"As the applications of mobile and ubiquitous technologies have become more extensive, the communication security issues of those applications are emerging as the most important concern. Therefore, studies are active in relation with various techniques and system applications for individual security elements. In this paper, we proposed a new technique which uses the voice features in order to generate Mobile One Time Passwords (OTPs) and generated safe and variable and safe passwords for one time use, using voice information of biometrics, which is used for powerful personal authentication. Also, we performed a simulation of homomorphic variability of voice feature points using dendrogram and distribution of voice feature points for the proposed password generation method.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model 基于N-Gram和向量空间模型的恶意代码相似度分析研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772331
Donghwi Lee, W. Park, Kuinam J. Kim
{"title":"A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model","authors":"Donghwi Lee, W. Park, Kuinam J. Kim","doi":"10.1109/ICISA.2011.5772331","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772331","url":null,"abstract":"The development of Information and Communication gives a lot of convenience in our lives, but on the other hand, the new cyber threat like viruses, computer intrusions and so on also increases. Especially, malicious codes such as viruses over the internet are distributed in large quantities. Several studies using reverse engineering or virtual machine have been carried out to analyze malicious codes, but studies on the analysis of the implications or the similarities between malicious codes have not been carried out in variety. Therefore, we suggest the analysis of similarity using N-Gram and Vector Space Model in this paper. The results shows that we can distinguish malicious codes from others using this method.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of Unpopular Citation Fields in Citation Matching Performance 非热门引文领域对引文匹配绩效的影响
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772372
HeeKwan Koo, Taehong Kim, H. Chun, Dongmin Seo, Hanmin Jung, Sungin Lee
{"title":"Effects of Unpopular Citation Fields in Citation Matching Performance","authors":"HeeKwan Koo, Taehong Kim, H. Chun, Dongmin Seo, Hanmin Jung, Sungin Lee","doi":"10.1109/ICISA.2011.5772372","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772372","url":null,"abstract":"Citation matching is a problem of identifying which citations correspond to the same publication. Previous studies on citation matching select typically from a corpus or database of citation records, such as CORA, an arbitrary set of citation record fields such as author, title - a practice informed by \"common sense\" - in order to automatically group citations that refer to the same document. This study describes a systematic and computational approach to extract out the 'best candidate' citation record fields, to propose that there is always the best combination of citation record fields that helps increase citation matching performance and is applicable regardless of which research framework one may adopt, such as Machine Learning methods or Information Retrieval algorithms. Cross comparisons between previous studies and our approach, shown as pairwise F1 measures, within our framework based on field selection are presented.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1964 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131324469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信