2014 IIAI 3rd International Conference on Advanced Applied Informatics最新文献

筛选
英文 中文
Visualizing Real-Time Questionnaire Results to Promote Participation in Interactive Presentations 可视化实时问卷调查结果,促进互动演示的参与
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.24
R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani
{"title":"Visualizing Real-Time Questionnaire Results to Promote Participation in Interactive Presentations","authors":"R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani","doi":"10.1109/IIAI-AAI.2014.24","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.24","url":null,"abstract":"An interactive presentation is intended to support lecturers that need to enhance presentation expressions and gather real-time feedback from audiences while delivering their presentations. Our objective is to improve the efficiency of bi-directional communication between a lecturer and a large audience in presentations using a real-time questionnaire that the result is displayed on a shared screen in real-time while gathering answers. The real-time questionnaire is based on a hybrid interactive presentation system that is collaboration between the traditional presentation supporting system and a web application. To gather feedback from audiences at presentations, our system provides the web application that delivers presentation slides to audiences and provides a feature of creating annotations and answering the questions on delivered presentation slides. The result of an experiment for evaluating performance of our system showed that the features of the real-time questionnaire have high performance scalability.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Text Filtering Based Approach to Classify Bug Injected and Fixed Changes 一种基于文本过滤的Bug注入与修正变更分类方法
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.141
A. Yamada, O. Mizuno
{"title":"A Text Filtering Based Approach to Classify Bug Injected and Fixed Changes","authors":"A. Yamada, O. Mizuno","doi":"10.1109/IIAI-AAI.2014.141","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.141","url":null,"abstract":"Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing probability over a target module is calculated, and it judges whether the given module is a fault-prone module. The predictive granularity of this technique is a module. In this study, we aimed at prediction with the finer granularity of the portion which induces a bug. Specifically, we tried to predict bug inducing changes by using source code differences of bug inducing changes and previous changes and a text filtering technique. Similarly, we tried to bug fixing predict by using source code differences of bug fixing changes and previous changes and a text filtering technique. To show the effectiveness of our approach, we conducted two experiments and compared our approach with fault-prone filtering by applying it to two open source projects, and obtained higher accuracy.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Tag Ownership Transfer Protocol for a Closed Loop System 闭环系统的RFID标签所有权转移协议
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.124
Ghaith Khalil, B. Ray, M. Chowdhury
{"title":"RFID Tag Ownership Transfer Protocol for a Closed Loop System","authors":"Ghaith Khalil, B. Ray, M. Chowdhury","doi":"10.1109/IIAI-AAI.2014.124","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.124","url":null,"abstract":"In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Generation of Stratified Image Database with Web Image Sharing Service and Ontology 基于Web图像共享服务和本体的分层图像数据库生成
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.189
Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto
{"title":"Generation of Stratified Image Database with Web Image Sharing Service and Ontology","authors":"Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto","doi":"10.1109/IIAI-AAI.2014.189","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.189","url":null,"abstract":"Preparation of a training image dataset used for the genetic object recognition system needs a lot of costs. Some datasets were recently created from Web image sharing services like Flickr, but examples which utilize a semantic classification or information of tags given to photos are quite few. This paper proposes an automatic generation method of an image dataset by introducing semantics of each label given to images, where the images are positioned in a semantic stratification according to the meaning of labels. Here the semantic stratification consists of IS-A relations, where \"Animal\" locates in a upper concept of \"Dog\" and \"Cat\". By using an image dataset with conceptual information like this, a computer will be able to recognize objects pictured in photos from a wide concept like \"Animal\" or \"Vehicle\" to narrower concepts gradually. In experiments, 47,910 photos were automatically classified into 183 classes which were aligned in a stratified tree. An evaluation test of the labels was performed manually for the generated image dataset and it was confirmed that most of labeling were reasonably collected.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Two-Stage Analog Neural Network Model and Hardware Implementation 两阶段模拟神经网络模型及硬件实现
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.184
M. Kawaguchi, M. Umeno, N. Ishii
{"title":"The Two-Stage Analog Neural Network Model and Hardware Implementation","authors":"M. Kawaguchi, M. Umeno, N. Ishii","doi":"10.1109/IIAI-AAI.2014.184","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.184","url":null,"abstract":"In the neural network field, many application models have been proposed. A neuro chip and an artificial retina chip are developed to comprise the neural network model and simulate the biomedical vision system. Previous analog neural network models were composed of the operational amplifier and fixed resistance. It is difficult to change the connection coefficient. In this study, we used analog electronic multiple and sample hold circuits. The connecting weights describe the input voltage. It is easy to change the connection coefficient. This model works only on analog electronic circuits. It can finish the learning process in a very short time and this model will enable more flexible learning.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental Data Migration for Multi-database Systems Based on MySQL with Spider Storage Engine 基于MySQL与Spider Storage Engine的多数据库系统增量数据迁移
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.151
Naoyuki Miyamoto, K. Higuchi, T. Tsuji
{"title":"Incremental Data Migration for Multi-database Systems Based on MySQL with Spider Storage Engine","authors":"Naoyuki Miyamoto, K. Higuchi, T. Tsuji","doi":"10.1109/IIAI-AAI.2014.151","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.151","url":null,"abstract":"Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database system is a kind of the distributed database system. It is a cluster of independent database systems. However, the distributed database system including the multi-database system has some problems. One of these problems is data migration between individual database systems in the multi-database system. Many reorganization techniques for distributed database systems are already proposed, but these techniques are not always adaptive to the data migration in the multi-database system. Incremental data migration is one of the solutions for this problem and it is easy to implement in the multi-database system. In this method, a large data migration is divided into small data migrations and other operations are inserted between these small data migrations. In this paper, the incremental data migration technique is evaluated in the multidatabase system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this multi-database system.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation 使用Ipsec实现的虚拟机安全实时迁移的评估
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.142
Norshazrul Azman Bin Sulaiman, Hideo Masuda
{"title":"Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation","authors":"Norshazrul Azman Bin Sulaiman, Hideo Masuda","doi":"10.1109/IIAI-AAI.2014.142","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.142","url":null,"abstract":"Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Impacts of Firm's Mimetic Isomorphic Behaviors on Customer Satisfaction from the Perspectives of Expectation Theory and Self-Determination Theory: An Approach of Hierarchical Linear Modeling 期望理论与自我决定理论视角下企业模仿同构行为对顾客满意的影响:层次线性模型方法
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.57
Sheau-Hwa Chen, Kuo-Hsun Liao
{"title":"Impacts of Firm's Mimetic Isomorphic Behaviors on Customer Satisfaction from the Perspectives of Expectation Theory and Self-Determination Theory: An Approach of Hierarchical Linear Modeling","authors":"Sheau-Hwa Chen, Kuo-Hsun Liao","doi":"10.1109/IIAI-AAI.2014.57","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.57","url":null,"abstract":"Mimetic isomorphic theory explains the process through which organizations in the same environment imitate each other's actions to become more similar to each other. This article makes the potential contribution that institutional theory can make to understanding the success of marketing practices. Based on the concept of mimetic isomorphic, expectation theory and self-determination theory, we apply these insights to investigate the relationship between automobile sales corporations' mimetic behaviors and customer expectation. The research demonstrates the use of a two-level hierarchical linear modeling (HLM) to examine the relationships.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"59 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Immersive Learning Design (ILD): A New Model to Assure the Quality of Learning through Flipped Classrooms 沉浸式学习设计:一种通过翻转课堂保证学习质量的新模式
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-11-24 DOI: 10.1109/IIAI-AAI.2014.67
H. Abdelaziz
{"title":"Immersive Learning Design (ILD): A New Model to Assure the Quality of Learning through Flipped Classrooms","authors":"H. Abdelaziz","doi":"10.1109/IIAI-AAI.2014.67","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.67","url":null,"abstract":"The objective of this paper was to develop an immersive Web-based learning model to assure the quality of learning through the flipped classrooms. The proposed model was guided theoretically by the flipped classroom as a new Web-based learning trend. It was also guided pedagogically by active and reflective learning principles that support transforming the teaching and learning practices from content engagement to cognitive engagement. The targeted immersive learning model encompasses of four reciprocal phases: Pro-act, Act, Reflect, and Re-act (PARR). To validate the suggested model, a convenience sample of graduate students studying an advanced statistics course was selected from the Distance Teaching and Training Program at the Arabian Gulf University After designing and applying this new immersive Web-based learning model (PARR), findings revealed that using the flipped classroom through this immersive Web-based learning model has a statistical and practical impact on developing achievement and self-study skills among graduate students. The contribution of this research is that it qualifies the Web-based instructional practices to shift from content acquisition act to knowledge expression and creation act. In addition, the paper will be of benefit to people looking for pedagogical applications of virtual and blended learning environments for developing multiple ways to express what learners know and be able to do.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128661283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Research Design for Observing of the International Joint Research Activities by Graduates 研究生国际联合研究活动观察的研究设计
2014 IIAI 3rd International Conference on Advanced Applied Informatics Pub Date : 2014-09-29 DOI: 10.1109/IIAI-AAI.2014.119
Kenta Kaneko, M. Mori
{"title":"A Research Design for Observing of the International Joint Research Activities by Graduates","authors":"Kenta Kaneko, M. Mori","doi":"10.1109/IIAI-AAI.2014.119","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.119","url":null,"abstract":"International students have been noted as the driving force behind the development of the economy and higher education institutions of the sending country. After graduation, it is assumed that graduates who work in their home countries give a positive effect to the alma mater through joint researches. In fact, international student support has been actively carried out in several universities. On the other hand, there is a finding that foreign students who returned to their original countries, left low performance. Therefore, the effect of international fame improvement through international students has not been demonstrated. Previous studies to measure the joint research after returning to original countries does not exist. First of all, I designed a system for extracting laboratory with many international joint research from a database in the university. Subsequently it is scheduled to analyze whether research networks are maintained by graduates of the laboratory after returning. I designed the system for extracting international joint research from university researchers information database. In the current scheme, it is not able to extract the student who graduated without co-authored papers with faculty. It is the task of the future.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114269452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信