{"title":"An Ontology-Based Recommendation System Using Long-Term and Short-Term Preferences","authors":"Jinbeom Kang, Joongmin Choi","doi":"10.1109/ICISA.2011.5772322","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772322","url":null,"abstract":"Personalized information retrieval and recommendation systems have been proposed to deliver the right information to users with different interests. However, most of previous systems are using keyword frequencies as the main factor for personalization, and as a result, they could not analyze semantic relations between words. Also, previous methods often fail to provide the documents that are related semantically with the query words. To solve these problems, we propose a recommendation system which provides relevant documents to users by identifying semantic relations between an ontology that semantically represents the documents crawled by a Web robot and user behavior history. Recommendation is mainly based on content-based similarity, semantic similarity, and preference weights.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Facility for Wandering and Manipulating the Structure of On-Line Data","authors":"M. Ito, Mitsugu Suzuki","doi":"10.1109/ICISA.2011.5772403","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772403","url":null,"abstract":"As the amount of information on the Web is getting bigger, creating a new tool to help people to find the needed information easily became one of the most important tasks. At the same time, a new trend called Mashup attracts attention because there is a lot of valuable data on-line. In this paper, we propose a new approach that enables users to collect the required information by exploring on the Web and do Mashup easily. The features of our tool are to be able to search information on the Web in consideration of html structures (e.g. table tag), mix up some data from different home pages, and manipulate data on the Web.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linux Based Unauthorized Process Control","authors":"Si-Jung Kim, C. Son, Cheongan Lee","doi":"10.1109/ICISA.2011.5772348","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772348","url":null,"abstract":"There is a problem of Linux security arising as Linux system has come out as a core of electric automated system and played a role of important operating system of mobile communications. This paper describes security of Linux and requirements, analyzes well-known weakness of Linux, suggests solutions through existing security solution, and introduces an improved Linux kernel module. It also suggests a security module of Linux kernel improved by controlling invaders to access and detecting unauthorized processors by modifying kernel module and provides integrity of system information by updating invasion information of operating system in real time. It is expected to be used as a solution in various server security solutions like firewall and IDS in the future","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2DPCA for Vehicle Detection from CCTV Captured Image","authors":"Chompoo Suppatoomsin, A. Srikaew","doi":"10.1109/ICISA.2011.5772313","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772313","url":null,"abstract":"This paper has proposed an application of 2D principal component analysis (2DPCA) and genetic algorithm (GA) for vehicle detection from CCTV captured image. The system deploys a 2DPCA algorithm for feature extraction of vehicle within gray scale images. These vehicle feature matrices of size 50x20 are trained and then classified by using genetic algorithm. This system can detect different vehicle sizes from different proportional image area. Bilinear interpolation is used to resize each proportional image area to vehicle feature matrix. The proposed system can detect various type of vehicles at the maximum accuracy of 95 percents.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114263926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link State Information Approximation for Hierarchical QoS Routing","authors":"Sora Kwon, Changho Jeon","doi":"10.1109/ICISA.2011.5772389","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772389","url":null,"abstract":"In this paper, Service Boundary Line approximation method is proposed to improve the accuracy of aggregated link state information in transport networks that conduct hierarchical QoS routing. This method selects the main link state information in the network and transports the data to the external networks together with the aggregation information, reducing information distortion caused from the loss of some link state information during link aggregation process. The proposed method is especially useful for aggregating links that have both delay and bandwidth as their QoS parameters. Simulation results show that our approximation method requires a storage space that is 1.5-2 times larger than those in other known techniques, depending on the main line state information selection method, but that information accuracy is 2-5 times higher","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Security Rating with the Use of the Slope-Ratio Method of a Figure","authors":"Woo-Seok Seo, Moon-seog Jun","doi":"10.1109/ICISA.2011.5772323","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772323","url":null,"abstract":"This study approaches a two-dimensional rectangular plane figure mathematically in order to improve a calculating method for a numerical value concerning the volume of inflow information based on all related items such as the traditional traffic input ratio measurement method, the width of network broadband, and transfer speed, as an information flow; thus, it deduces a ratio formula that calculates information volume according to a slope angle that expresses a formula in proportion to the weight regarding the inflow traffic volume. With deduced values, the study proposes a standardization process in the search for a new formula in access and values. Also, the study analyzed and classified aggressiveness with a slope ratio through the weight of inflow traffic. Then, given the fact that the higher the inflow traffic volume, the higher the possibility of the attack ratio, the study is to propose a research assignment that improves the security rating mechanism according to the new slope-ratio method.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126700196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Development of Personal Cloud Computing for Mobile Thin-Clients","authors":"Yuan Tian, Biao Song, E. Huh","doi":"10.1109/ICISA.2011.5772368","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772368","url":null,"abstract":"The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing \"from being device-centric to information-centric\", which create a bridge between operating system-based computing and the more service-oriented approach to IT. Also, the mobile thin-client has brought mobility to cloud computing. In this paper, we provide a reference base for the development of methodologies tailored for personal cloud computing. Besides, we also provide a security architecture for personal cloud based on the security requirement analysis.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Information Requirement Engineering","authors":"Dhirendra Pandey, U. Suman, A. Ramani","doi":"10.1109/ICISA.2011.5772332","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772332","url":null,"abstract":"Requirement engineering is a crucial activity, which can affect the entire life cycle of software development project. The main objective of requirement engineering is to collect requirements from different viewpoints such as business requirements, customer requirements, user requirements, constraints, security requirements etc. Information is also one of the important requirements of requirement engineering process to develop quality and updated software. Typically, the specification of information requirements commences with observing and interviewing people at different levels. The collected information flows across the management spectrum in decision making for project development. In this paper, we discuss a noble approach for Information Requirement Engineering (IRE) that can assist to collect proper and valuable information for software development. Also, we examine the process of analyzing the obtained information at different level of management spectrum, which may lead to positive changes in an organisation.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Based Implementation Methodologies for Deep Packet Inspection","authors":"Ajay Chaudhary, A. Sardana","doi":"10.1109/ICISA.2011.5772430","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772430","url":null,"abstract":"Deep Packet Inspection plays an important role for providing secure and congestion free network. It determines whether incoming traffic matches a database of signatures up to payload level, where each signature represents an attack, vulnerability, Virus, worm and even type of traffic. Other techniques like IDS/IPS etc uses only packet header information for decision making, while DPI is considers whole packet including payload for matching which provides better surveillance then other techniques. The problems that DPI system faces is low packet throughput, high memory requirement, latency and low accuracy at line speed of 10GbE/OC192.This paper reviews different software based approaches for efficient implementation of Deep Packet Inspection. A comparative study has been performed for these approaches on the basis of packet throughput and memory requirements. This paper is an attempt to exhaustively review existing techniques to addresses the probable research gaps. It then suggests a novel software based implementation of DPI to overcome the identified research gaps.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming Media with Sensory Effect","authors":"Bumsuk Choi, Eun-Seo Lee, Kyoungro Yoon","doi":"10.1109/ICISA.2011.5772390","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772390","url":null,"abstract":"4D is an irresistible new trend in movie industry. Also the Digital Cinema technology is pervasive in most of theatre system. They provide movies in streaming way to the theatres simultaneously. We present a framework for streaming service with sensory effect to bring 4-D entertainment home based on MPEG-V standard. A complete framework for 4-D streaming can be supported from authoring of sensory effects to environment description and commanding rendering devices for the sensory effects by MPEG-V and couple of other standards. Now the standard and the framework technology are ready for streaming 4-D contents for users in home","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}