2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Named Entity Relation Extraction Based on Multiple Features 基于多特征的命名实体关系提取
Yeqing Li
{"title":"Named Entity Relation Extraction Based on Multiple Features","authors":"Yeqing Li","doi":"10.1109/WAINA.2015.14","DOIUrl":"https://doi.org/10.1109/WAINA.2015.14","url":null,"abstract":"For the limited availability of established Mongolian named entity dictionary, with the increase of the new terminology and network vocabulary, Mongolian named entity dictionary was not able to update in time. This paper puts forward a method of named entity recognition, which based on a combination of multiple features and CRF. The method of named entity recognition proposed in this paper firstly cluster the entities that never appear in the repository with the method of hierarchical converged clustering, then carry through the normal words recognition and adjust the results of feature base.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"106 1","pages":"213-216"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78098513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis POS序列在推特情感分析中句型分析的应用
Fajri Koto, M. Adriani
{"title":"The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis","authors":"Fajri Koto, M. Adriani","doi":"10.1109/WAINA.2015.58","DOIUrl":"https://doi.org/10.1109/WAINA.2015.58","url":null,"abstract":"As one of the largest Social Media in providing public data every day, Twitter has attracted the attention of researcher to investigate, in order to mine public opinion, which is known as Sentiment Analysis. Consequently, many techniques and studies related to Sentiment Analysis over Twitter have been proposed in recent years. However, there is no study that discuss about sentence pattern of positive/negative sentence and neither subjective/objective sentence. In this paper we propose POS sequence as feature to investigate pattern or word combination of tweets in two domains of Sentiment Analysis: subjectivity and polarity. Specifically we utilize Information Gain to extract POS sequence in three forms: sequence of 2-tags, 3-tags, and 5-tags. The results reveal that there are some tendencies of sentence pattern which distinguish between positive, negative, subjective and objective tweets. Our approach also shows that feature of POS sequence can improve Sentiment Analysis accuracy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"274 1","pages":"547-551"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secured mVoIP Service over Cloud and Container-Based Improvement 基于云和容器的安全移动voip服务改进
Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim
{"title":"Secured mVoIP Service over Cloud and Container-Based Improvement","authors":"Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim","doi":"10.1109/AINA.2015.269","DOIUrl":"https://doi.org/10.1109/AINA.2015.269","url":null,"abstract":"The VoIP technology is being revisited to support diversified services and mobile computing has been changing to mobile cloud computing paradigm. In this paper, we design and implement cloud-leveraged secured voice services, enabled by the combination of open-source software PBX (private branch exchange), shared hardware platform, and mobile devices. We also test and verify the end-to-end delay of the secured voice communication. In addition, we propose a preliminary idea to improve the portability by adopting Docker-based containers.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"224 1","pages":"791-795"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80047268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Stock Market Using Twitter Trust Network 利用Twitter信任网络探索股票市场
Yefeng Ruan, L. Alfantoukh, A. Durresi
{"title":"Exploring Stock Market Using Twitter Trust Network","authors":"Yefeng Ruan, L. Alfantoukh, A. Durresi","doi":"10.1109/AINA.2015.217","DOIUrl":"https://doi.org/10.1109/AINA.2015.217","url":null,"abstract":"As social networks are becoming more and more popular, more and more data are available from them. Researchers are now trying to extract useful information from these big data. One possible usage of social media is to investigate stock market. There are two major events to measure in stock market - price change and trade volume. In this paper, we firstly use our trust framework to build up trust network among Twitter users in a stock market group. We compare trust information extracted from Twitter group with Dow Jones Industrial Average (DJIA) get from Yahoo! Finance. Our results show that by taking trust information into account, they are more correlated than just counting the number of tweets. Also it shows us that trade volume is stronger correlated than price change.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"428-433"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82472310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method 基于节电方法的云基础设施监控平台的实现
Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu
{"title":"Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method","authors":"Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu","doi":"10.1109/WAINA.2015.49","DOIUrl":"https://doi.org/10.1109/WAINA.2015.49","url":null,"abstract":"With the popularity of cloud computing due to increasing requests for cloud services, the demand for building better cloud infrastructure is increasing. Many services on cloud infrastructure are not being accessed all the time, during periods of low usage, if lots of servers keep working, it will cause unnecessary power waste. The aim of this paper is based on the Cloud service Infrastructure as a Service, use KVM and libvirt to build cloud environments. By giving every host and VM a power cap, we perform live-migration on VMs and shutdown idle hosts to save power. We also build an interface that enables users to monitor virtual machines and physical machines. In the experiment, we use PDU to record the power consumption information, and from analysis of these data we prove that we can more effectively utilize hardware resources and save power.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"223-228"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks 基于禁忌搜索的LTE网络TAs重构方法
H. Safa, Nadine Ahmad
{"title":"Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks","authors":"H. Safa, Nadine Ahmad","doi":"10.1109/AINA.2015.241","DOIUrl":"https://doi.org/10.1109/AINA.2015.241","url":null,"abstract":"In LTE networks, tracking areas (TAs) design affects the signaling cost of user equipments (UEs) during mobility. Indeed, when the latter are called, the mobility management entity (MME), which records the TA in which the UE is registered, broadcasts a paging message in the UE's TA to determine the exact cell through which the call should be delivered. When a UE moves to a new TA, a TA update might be performed either to update the MME or the home subscriber server (HSS) depending on whether the move is intra-or inter-MME. TA update and paging result in a significant amount of signaling overhead. The TA design is usually optimized during the network planning phase. However, the mobility of UEs might turn the initial TA configuration inefficient requiring TA reconfiguration. In this paper we use the tabu search (TS) heuristic to solve TAs reconfiguration problem in LTE networks taking into consideration both signaling overhead and reconfiguration cost. We compare our solution with a variation of the genetic algorithm (GA) based solution found in the literature. Preliminary numerical results showed that the TS algorithm outperformed the GA due to the TS different memory mechanisms used to avoid moves that might lead to non-feasible solutions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"593-599"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81526735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks 无线传感器网络ruheed旋转不相等聚类算法
Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah
{"title":"RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks","authors":"Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah","doi":"10.1109/WAINA.2015.86","DOIUrl":"https://doi.org/10.1109/WAINA.2015.86","url":null,"abstract":"Prolonging the network lifetime, scalability and balancing are very important requirements when implementing a wireless sensor network (WSN). Clustering is a technique that has been widely applied for achieving these goals. However, there exists the energy hole problem which causes an unbalanced energy consumption in equally formed clusters. More specifically, nodes near the base station (BS) die very quickly since they, not only transmit their own data, but also forwards the rest of the network data. In this article, we propose a rotated unequal clustering protocol RUHEED in order to mitigate the energy hole problem. Our experiments show that RUHEED improves the network lifetime when compared to other clustering protocols.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89605692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System 基于软件定义和认知无线网络的容灾系统性能评估
Goshi Sato, Noriki Uchida, Y. Shibata
{"title":"Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/AINA.2015.262","DOIUrl":"https://doi.org/10.1109/AINA.2015.262","url":null,"abstract":"Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of network connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an Open Flow based access network to automatically control link and route selections within the cognitive wireless network to Internet by periodically monitoring and evaluating their network states. In order to verify the usefulness of our proposed system, a prototype of Open Flow based cognitive wireless network system is constructed by connecting the disaster areas in the East Japan Great Earthquake and its performance is evaluated.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"741-746"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87187448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Server Selection Method for Web-Based Multiserver Systems 基于web的多服务器系统的服务器选择方法
Masaki Kohana, S. Okamoto
{"title":"A Server Selection Method for Web-Based Multiserver Systems","authors":"Masaki Kohana, S. Okamoto","doi":"10.1109/AINA.2015.174","DOIUrl":"https://doi.org/10.1109/AINA.2015.174","url":null,"abstract":"In our previous work, we proposed a dynamic data reallocation method for Web-based multiserver Multiplayer On-line Role-Playing Game (MORPG) systems. This method handles the data allocation as a combinational optimization problem. It is solved by using a tabu search that is a well-known meta-heuristic algorithm. Our system has some Web servers and an additional computation server. The computation server solves algorithm and decides the data allocation. However, each load of server is not completely balanced. This means that some Web server might have free computing resources. We aim to use these resources effectively. Therefore, our system handles a Web server that has free resources as a computation server. In this paper, we propose a selection method of a computation server in the Web servers. The server loads might be predicted because the data allocation is decided according to the last server loads and the user requests. Therefore, our system predicts the load of each server and selects a Web server. This selected server acts the computation server and decides the data allocation for the next term. After that, the computation server predicts the server load and selects the next computation server. We evaluates the performance of our system by measuring the latency values for game users and the server loads.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"237 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88911762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks 网格拓扑网络中基于Rete算法的规则处理方案
Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto
{"title":"A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks","authors":"Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto","doi":"10.1109/AINA.2015.252","DOIUrl":"https://doi.org/10.1109/AINA.2015.252","url":null,"abstract":"Recently, sensor devices such as temperature sensors or cameras are used for various purposes. These devices sometimes construct ad hoc networks, and a grid topology is one of their typical network topologies. Describing processing by rules is suitable for them since the system can flexibly change their processing according to their purposes. By relieving their rule processing loads and communication delay, the system can be applied for many applications. However, there is no rule processing schemes to realize those. In this paper, we propose a rule processing scheme using the Rete algorithm. Our proposed scheme can realize rule processing reducing redundant loads and delay for many applications.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"674-679"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85046643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信