2011 International Conference on Information Science and Applications最新文献

筛选
英文 中文
A Valid Frequency Range Analysis of Throat Signal for Voice Command System 语音指挥系统喉部信号的有效频率范围分析
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772383
Young-Giu Jung, Munsung Han, Kyung-Yong Chung, Sang Jo Lee
{"title":"A Valid Frequency Range Analysis of Throat Signal for Voice Command System","authors":"Young-Giu Jung, Munsung Han, Kyung-Yong Chung, Sang Jo Lee","doi":"10.1109/ICISA.2011.5772383","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772383","url":null,"abstract":"In this paper, a valid frequency range of throat signal analyses is presented. Compare to speech signals, the throat signals have many differences in the amount of information. In this context, targeting on throat signals to find valid frequency range is one of the most important analyses for the development of new breed of feature extraction algorithm. In this respect, using analysis similarity of throat signals feature distribution and correlation analysis of throat signals in the frequency domain, the frequency range can be found with effective and quick response time to be applied to a voice command recognition system using neck-microphone. As a result, the proposed frequency range is from 200Hz(center frequency) to 2001Hz(center frequency). For the neck-microphone voice command system using the proposed frequency range, a significant reduction in time complexity of 25% can be achieved without any loss in recognition rate.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliability of Representative Reviewers on the Web Web上代表性审稿人的可靠性
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772422
Sang-Min Choi, Jeong-Won Cha, Laehyun Kim, Yo-Sub Han
{"title":"Reliability of Representative Reviewers on the Web","authors":"Sang-Min Choi, Jeong-Won Cha, Laehyun Kim, Yo-Sub Han","doi":"10.1109/ICISA.2011.5772422","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772422","url":null,"abstract":"There are opinion leaders in a society who represent the opinion of general public. The general public accepts information not only by mass media but also by opinion leaders. Since the late 20th century, the number of Internet users has increased fast. Many users interact with each other in an online social network. This makes the Web community similar to the real society. Thus it is a natural task to find influential users in an online society. For example, many online articles posted by influential bloggers are used as marketing tools for companies or political advertisements for parties since these articles have huge influence to other users. We first revisit the previous researches on finding influential users in online society. Then we compose test sets from the GroupLens movie database and identify representative reviewers. Next, we show the validity of the chosen representative reviewers and test the reliability using the 10-fold cross- validation. Finally, we explain applicability of the proposed approach to improve current recommendation systems.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132547233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency of MAC Protocols in Wireless Sensor Networks 无线传感器网络中MAC协议的能量效率
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772405
Jian Shen, Faliu Yi, S. Moh, I. Chung
{"title":"Energy Efficiency of MAC Protocols in Wireless Sensor Networks","authors":"Jian Shen, Faliu Yi, S. Moh, I. Chung","doi":"10.1109/ICISA.2011.5772405","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772405","url":null,"abstract":"Wireless sensor networks (WSNs) have appealed to researchers due to their wide range of application areas such as target detection and tracking, environment monitoring, and tactical systems. For WSNs, various medium access control (MAC) protocols with different objectives have been proposed. Designing energy-efficient MAC protocols has a significant influence on the network lifetime in WSNs. However, short sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient MAC protocol subject to energy constraints. In this paper, we study the energy efficiency of typical MAC protocols in WSNs systematically. The MAC protocols are categorized into contention-based, TDMA-based, hybrid, and cross layer MAC protocols according to channel access policy, and their pros and cons are qualitatively compared. Then, the typical MAC protocols are evaluated in terms of energy efficiency using the ns-2 network simulator and compared to each other quantitatively.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk Management for Fuzzy Random MST Problem Based on Conditional Value-at-Risk 基于条件风险值的模糊随机MST问题风险管理
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772344
T. Hasuike, H. Katagiri
{"title":"Risk Management for Fuzzy Random MST Problem Based on Conditional Value-at-Risk","authors":"T. Hasuike, H. Katagiri","doi":"10.1109/ICISA.2011.5772344","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772344","url":null,"abstract":"This paper deals with a minimum spanning tree problem where each edge weight is a fuzzy random variable. In terms of risk management in order to avoid adverse impacts derived from uncertainty, conditional Value-at-Risk including a necessity measure for fuzziness is introduced as a risk measure. Furthermore, by performing the deterministic equivalent transformation, the proposed problem is transformed into an existing minimum spanning tree problem to apply polynomial-time algorithms, and a solution algorithm is developed to solve the proposed problem.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115304768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Frequent Pattern Tree Based Association Rule Mining Technique 基于频繁模式树的改进关联规则挖掘技术
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772412
A. Islam, Tae-Sun Chung
{"title":"An Improved Frequent Pattern Tree Based Association Rule Mining Technique","authors":"A. Islam, Tae-Sun Chung","doi":"10.1109/ICISA.2011.5772412","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772412","url":null,"abstract":"Discovery of association rules among the large number of item sets is considered as an important aspect of data mining. The ever increasing demand of finding pattern from large data enhances the association rule mining. Researchers developed a lot of algorithms and techniques for determining association rules. The main problem is the generation of candidate set. Among the existing techniques, the frequent pattern growth (FP-growth) method is the most efficient and scalable approach. It mines the frequent item set without candidate set generation. The main obstacle of FP growth is, it generates a massive number of conditional FP tree. In this research paper, we proposed a new and improved FP tree with a table and a new algorithm for mining association rules. This algorithm mines all possible frequent item set without generating the conditional FP tree. It also provides the frequency of frequent items, which is used to estimate the desired association rules","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"91 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
A Study on the Design of the Web Service Selection Administrator Based on Meta Broker 基于Meta Broker的Web服务选择管理员设计研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772415
Sungho Sim, Su-Jin Baek, Young-Jae Song
{"title":"A Study on the Design of the Web Service Selection Administrator Based on Meta Broker","authors":"Sungho Sim, Su-Jin Baek, Young-Jae Song","doi":"10.1109/ICISA.2011.5772415","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772415","url":null,"abstract":"Web Services make the efficient uses of the information resources, and the integration and reuse thereof. In the current context of the Web, there are a number of searching methods in use. But all of these are only focusing on the functional aspects, and as a result there are a certain set of limitations that these search methods could not overcome. The purpose of this study is to enhance the web services in consideration of the functional aspects by suggesting a practical level decision making reflecting the functional and non-functional aspects using WSDL and meta-data upon the web services. For this purpose, the execution costs, reliability, and the quality level from the non-functional aspects of the existing studies are used to extract and save the detailed and clearly defined meta-data to record the non-functional elements. The selection administrator of the meta-broker uses these records to give rates and display the output value of the user intent. In this study, with a view to make it possible to use the kind of web service in consideration of the user oriented, non-functional aspects through extracting the meta-data and using the meta-broker, a meta-broker selection administrator and the process thereof that help the users to enjoy the desired level of quality are suggested, from the view point of the users.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116262033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Energy Efficient and Reliable Geographic Routing in WSNs 无线传感器网络中高效可靠地理路由的性能评估
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772315
Eunil Park, Kwangsu Cho
{"title":"Performance Evaluation of Energy Efficient and Reliable Geographic Routing in WSNs","authors":"Eunil Park, Kwangsu Cho","doi":"10.1109/ICISA.2011.5772315","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772315","url":null,"abstract":"We use wireless networks in various field. However, a link of realistic wireless sensor networks (WSNs) can be unreliable. Therefore, data forwarding with efficiency and reliability is a core issue. For solving previous geographic routing protocols, we proposed Protocol considering Both side of Link-quality and Energy (PBLE), an efficient and optimal routing protocol that uses modified link-quality, distance, and energy. In this paper, we simulate PBLE in various environments of realistic WSNs. Additionally, we use node scheduling method for prolonging lifetime of WSN. Simulation results show that PBLE achieves better results than other geographic routing protocols in all scenarios of WSNs.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters 基于多参数DBSCAN聚类的异常检测
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772437
Tran Manh Thang, Juntae Kim
{"title":"The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters","authors":"Tran Manh Thang, Juntae Kim","doi":"10.1109/ICISA.2011.5772437","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772437","url":null,"abstract":"DBSCAN is one of powerful density-based clustering algorithms for detecting outliers, but there are some difficulties in finding its parameters (epsilon and minpts). Currently, there is also no way to use DBSCAN with different parameters for different cluster when it is applied to anomaly detection when network traffic includes multiple traffic types with different characteristics. In this paper, we propose a new way of finding DBSCAN's parameters and applying DBSCAN with those parameters. Each cluster may have different epsilon and minpts values in our algorithm. The algorithm is called DBSCAN-MP. We also propose a mechanism of updating normal behavior by updating size or creating new clusters when network environment is changing overtime. We evaluate proposed algorithm using the KDD Cup 1999 dataset. The result shows that the performance is improved compare to other clustering algorithms.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Semantic Interaction TV Based on Spatial Relations and Ontology 基于空间关系和本体的语义交互
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772375
Yoo-Won Kim, Seung-Bo Park, Kee-Sung Lee, Geun-Sik Jo, Jahyun Choi
{"title":"Semantic Interaction TV Based on Spatial Relations and Ontology","authors":"Yoo-Won Kim, Seung-Bo Park, Kee-Sung Lee, Geun-Sik Jo, Jahyun Choi","doi":"10.1109/ICISA.2011.5772375","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772375","url":null,"abstract":"We propose a novel T-commerce model based on semantic interaction, as the TV broadcasting environment is moving to interactive digital TV such as IPTV, Hybrid TV, and Smart TV. The purpose of our work is to design and implement the system of our new T-commerce model. Thus, our system applies spatial relation rules and ontology for object recognition if a viewer is interested in one on the screen of TV program such as drama, movie, and news. All object information needs to be annotated in a TV program to identify the user selection. However, the effort must be reduced, as it costs too much. The program can be identified as an annotated item, a combination of known base area and spatial relations to the user selection, even though it does not have the exact position. The TV system can semantically interact with the user via this combination. A prototype system, semantic interaction TV, has been implemented to achieve this semantic interaction. Our case studies show that the proposed system is useful to T-commerce.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on the Leak of Core Business Technologies Using Preventative Security Methods Such as Data Mining 基于数据挖掘等预防性安全方法的核心业务技术泄漏研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772329
Seung Pyo Huh, Donghwi Lee, Kuinam J. Kim, Sang Min Park
{"title":"A Study on the Leak of Core Business Technologies Using Preventative Security Methods Such as Data Mining","authors":"Seung Pyo Huh, Donghwi Lee, Kuinam J. Kim, Sang Min Park","doi":"10.1109/ICISA.2011.5772329","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772329","url":null,"abstract":"Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129511138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信