{"title":"Named Entity Relation Extraction Based on Multiple Features","authors":"Yeqing Li","doi":"10.1109/WAINA.2015.14","DOIUrl":"https://doi.org/10.1109/WAINA.2015.14","url":null,"abstract":"For the limited availability of established Mongolian named entity dictionary, with the increase of the new terminology and network vocabulary, Mongolian named entity dictionary was not able to update in time. This paper puts forward a method of named entity recognition, which based on a combination of multiple features and CRF. The method of named entity recognition proposed in this paper firstly cluster the entities that never appear in the repository with the method of hierarchical converged clustering, then carry through the normal words recognition and adjust the results of feature base.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"106 1","pages":"213-216"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78098513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis","authors":"Fajri Koto, M. Adriani","doi":"10.1109/WAINA.2015.58","DOIUrl":"https://doi.org/10.1109/WAINA.2015.58","url":null,"abstract":"As one of the largest Social Media in providing public data every day, Twitter has attracted the attention of researcher to investigate, in order to mine public opinion, which is known as Sentiment Analysis. Consequently, many techniques and studies related to Sentiment Analysis over Twitter have been proposed in recent years. However, there is no study that discuss about sentence pattern of positive/negative sentence and neither subjective/objective sentence. In this paper we propose POS sequence as feature to investigate pattern or word combination of tweets in two domains of Sentiment Analysis: subjectivity and polarity. Specifically we utilize Information Gain to extract POS sequence in three forms: sequence of 2-tags, 3-tags, and 5-tags. The results reveal that there are some tendencies of sentence pattern which distinguish between positive, negative, subjective and objective tweets. Our approach also shows that feature of POS sequence can improve Sentiment Analysis accuracy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"274 1","pages":"547-551"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim
{"title":"Secured mVoIP Service over Cloud and Container-Based Improvement","authors":"Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim","doi":"10.1109/AINA.2015.269","DOIUrl":"https://doi.org/10.1109/AINA.2015.269","url":null,"abstract":"The VoIP technology is being revisited to support diversified services and mobile computing has been changing to mobile cloud computing paradigm. In this paper, we design and implement cloud-leveraged secured voice services, enabled by the combination of open-source software PBX (private branch exchange), shared hardware platform, and mobile devices. We also test and verify the end-to-end delay of the secured voice communication. In addition, we propose a preliminary idea to improve the portability by adopting Docker-based containers.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"224 1","pages":"791-795"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80047268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Stock Market Using Twitter Trust Network","authors":"Yefeng Ruan, L. Alfantoukh, A. Durresi","doi":"10.1109/AINA.2015.217","DOIUrl":"https://doi.org/10.1109/AINA.2015.217","url":null,"abstract":"As social networks are becoming more and more popular, more and more data are available from them. Researchers are now trying to extract useful information from these big data. One possible usage of social media is to investigate stock market. There are two major events to measure in stock market - price change and trade volume. In this paper, we firstly use our trust framework to build up trust network among Twitter users in a stock market group. We compare trust information extracted from Twitter group with Dow Jones Industrial Average (DJIA) get from Yahoo! Finance. Our results show that by taking trust information into account, they are more correlated than just counting the number of tweets. Also it shows us that trade volume is stronger correlated than price change.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"428-433"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82472310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu
{"title":"Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method","authors":"Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu","doi":"10.1109/WAINA.2015.49","DOIUrl":"https://doi.org/10.1109/WAINA.2015.49","url":null,"abstract":"With the popularity of cloud computing due to increasing requests for cloud services, the demand for building better cloud infrastructure is increasing. Many services on cloud infrastructure are not being accessed all the time, during periods of low usage, if lots of servers keep working, it will cause unnecessary power waste. The aim of this paper is based on the Cloud service Infrastructure as a Service, use KVM and libvirt to build cloud environments. By giving every host and VM a power cap, we perform live-migration on VMs and shutdown idle hosts to save power. We also build an interface that enables users to monitor virtual machines and physical machines. In the experiment, we use PDU to record the power consumption information, and from analysis of these data we prove that we can more effectively utilize hardware resources and save power.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"223-228"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks","authors":"H. Safa, Nadine Ahmad","doi":"10.1109/AINA.2015.241","DOIUrl":"https://doi.org/10.1109/AINA.2015.241","url":null,"abstract":"In LTE networks, tracking areas (TAs) design affects the signaling cost of user equipments (UEs) during mobility. Indeed, when the latter are called, the mobility management entity (MME), which records the TA in which the UE is registered, broadcasts a paging message in the UE's TA to determine the exact cell through which the call should be delivered. When a UE moves to a new TA, a TA update might be performed either to update the MME or the home subscriber server (HSS) depending on whether the move is intra-or inter-MME. TA update and paging result in a significant amount of signaling overhead. The TA design is usually optimized during the network planning phase. However, the mobility of UEs might turn the initial TA configuration inefficient requiring TA reconfiguration. In this paper we use the tabu search (TS) heuristic to solve TAs reconfiguration problem in LTE networks taking into consideration both signaling overhead and reconfiguration cost. We compare our solution with a variation of the genetic algorithm (GA) based solution found in the literature. Preliminary numerical results showed that the TS algorithm outperformed the GA due to the TS different memory mechanisms used to avoid moves that might lead to non-feasible solutions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"593-599"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81526735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah
{"title":"RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks","authors":"Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah","doi":"10.1109/WAINA.2015.86","DOIUrl":"https://doi.org/10.1109/WAINA.2015.86","url":null,"abstract":"Prolonging the network lifetime, scalability and balancing are very important requirements when implementing a wireless sensor network (WSN). Clustering is a technique that has been widely applied for achieving these goals. However, there exists the energy hole problem which causes an unbalanced energy consumption in equally formed clusters. More specifically, nodes near the base station (BS) die very quickly since they, not only transmit their own data, but also forwards the rest of the network data. In this article, we propose a rotated unequal clustering protocol RUHEED in order to mitigate the energy hole problem. Our experiments show that RUHEED improves the network lifetime when compared to other clustering protocols.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89605692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/AINA.2015.262","DOIUrl":"https://doi.org/10.1109/AINA.2015.262","url":null,"abstract":"Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of network connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an Open Flow based access network to automatically control link and route selections within the cognitive wireless network to Internet by periodically monitoring and evaluating their network states. In order to verify the usefulness of our proposed system, a prototype of Open Flow based cognitive wireless network system is constructed by connecting the disaster areas in the East Japan Great Earthquake and its performance is evaluated.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"741-746"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87187448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Server Selection Method for Web-Based Multiserver Systems","authors":"Masaki Kohana, S. Okamoto","doi":"10.1109/AINA.2015.174","DOIUrl":"https://doi.org/10.1109/AINA.2015.174","url":null,"abstract":"In our previous work, we proposed a dynamic data reallocation method for Web-based multiserver Multiplayer On-line Role-Playing Game (MORPG) systems. This method handles the data allocation as a combinational optimization problem. It is solved by using a tabu search that is a well-known meta-heuristic algorithm. Our system has some Web servers and an additional computation server. The computation server solves algorithm and decides the data allocation. However, each load of server is not completely balanced. This means that some Web server might have free computing resources. We aim to use these resources effectively. Therefore, our system handles a Web server that has free resources as a computation server. In this paper, we propose a selection method of a computation server in the Web servers. The server loads might be predicted because the data allocation is decided according to the last server loads and the user requests. Therefore, our system predicts the load of each server and selects a Web server. This selected server acts the computation server and decides the data allocation for the next term. After that, the computation server predicts the server load and selects the next computation server. We evaluates the performance of our system by measuring the latency values for game users and the server loads.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"237 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88911762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto
{"title":"A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks","authors":"Tomoya Kawakami, T. Yoshihisa, Y. Yanagisawa, M. Tsukamoto","doi":"10.1109/AINA.2015.252","DOIUrl":"https://doi.org/10.1109/AINA.2015.252","url":null,"abstract":"Recently, sensor devices such as temperature sensors or cameras are used for various purposes. These devices sometimes construct ad hoc networks, and a grid topology is one of their typical network topologies. Describing processing by rules is suitable for them since the system can flexibly change their processing according to their purposes. By relieving their rule processing loads and communication delay, the system can be applied for many applications. However, there is no rule processing schemes to realize those. In this paper, we propose a rule processing scheme using the Rete algorithm. Our proposed scheme can realize rule processing reducing redundant loads and delay for many applications.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"674-679"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85046643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}