Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Hidekazu Tanaka
Pages: 1 - 10
Dimension reduction of data is an important theme in the data processing to represent and manipulate higher dimensional data. Rough set is fundamental and useful to process higher dimensional data. Reduct in the rough set is a minimal subset of features, which has almost the same discernible power as...
Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut
Pages: 1 - 10
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content...
Xiao Sun, Chongyuan Sun, Changqin Quan, Fuji Ren, Fang Tian, Kunxia Wang
Pages: 1 - 11
Nowadays, with the rapid development of B2C e-commerce and the popularity of online shopping, the Web storages huge number of product reviews comment by customers. A large number of reviews made it difficult for manufacturers or potential customers to track the comments and suggestions that customers...
Sidney C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel
Pages: 1 - 10
In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss based upon the rate of packet loss. The first question...
Roger Yim Lee
Pages: 1 - 1
Farhan Rahman Wasee, Rahman Mohammad Asif Amin, Zareen Tasnim Raisa, Sadia Chowdhury, Tanisha Nourin Alam, Rashedur Mohammad Rahman
Pages: 1 - 10
Land surface processes have become a great concern in the context of global change and increased natural hazards all over the world. In this paper, dynamic characteristics of land cover changes have been investigated over a period of about three and half decades (1972–2016). This study focuses on the...
Krissada Rongrat, Twittie Senivongse
Pages: 1 - 10
Information systems such as those in the Banking sector need to comply with security regulations to assure that necessary security controls are in place. This paper presents an initial risk assessment method to assist a banking information system project in validating security requirements of the system....
Atsushi Nunome, Hiroaki Hirata
Pages: 1 - 8
We have proposed a distributed storage system which autonomously migrates data blocks into a suitable storage node by considering their access frequency and read/write ratio. In this paper, we show that revised data migration policies can rapidly distribute input/output (I/O) hot spot over the storage...
Si Young Lee, Sae Yong Oh, Sangwook Lee, Gwang Yong Gim
Pages: 1 - 9
The determination of the firm life cycle has been carried out in relation to the establishment of corporate strategy in the field of accounting or management. The life cycle prediction based on financial information is long because it is determined based on the financial performance of the entity over...
Juhnyoung Lee
Pages: 2 - 8
Today’s IT infrastructure is under tremendous pressure and is finding it difficult to keep up. In distributed computing environments, up to 85 percent of computing capacity sits idle. 66 percent of every dollar on IT is spent on maintaining current IT infrastructures versus adding new capabilities. In...
Ichrak Amdouni, Pascale Minet, Cedric Adjih
Pages: 9 - 24
The goal of this paper is to present OSERENA, a distributed coloring algorithm optimized for dense wireless sensor networks (WSNs). Network density has an extremely reduced impact on the size of the messages exchanged to color the WSN. Furthermore, the number of colors used to color the network is not...
Hsiung-Cheng Lin, Jhih-Yao Hu, Chung-Hao Cheng
Pages: 9 - 15
Copper wire can be elongated to a very thin size like 0.01 mm from an original 0.6 mm via wire drawing dies. Although automatic machines are available for wire elongating process, the wire threading through dies still requires a human operation before entering an automation process. This procedure may...
Hyun Jae Yoo, Sungwoong Seo, Sun Woo Im, Gwang Yong Gim
Pages: 10 - 18
This study compared and analyzed the speech recognition performance of Korean phonological rules for cloud-based Open APIs, and analyzed the speech recognition characteristics of Korean phonological rules. As a result of the experiment, Kakao and MS showed good performance in speech recognition. By phonological...
Bo Zhao, Rui Ding, Lin Han, Jinlong Xu
Pages: 11 - 25
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistribution mainly by generating communication code that each processor sends all data defined...
Shengbo Chen, Dashen Sun, Huaikou Miao
Pages: 11 - 20
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis. Therefore, when analyzing Java programs, we must take the alias and...
Hoai Nam Vu, Tuan Anh Tran, Na In Seop, Soo Hyung Kim
Pages: 11 - 21
Textual data plays an important role in a number of applications such as image database indexing, document understanding, and image-based web searching. The target of automatic real-life text extracting in document images without character recognition module is to identify image regions that contain...
Ajchara Phu-ang
Pages: 11 - 19
The objective of the research is to solve the flexible job shop scheduling problem (FJSP). In this paper, the new algorithm is proposed mainly based on discrete concepts of the differential evolution (DE) algorithm with the new idea called the fuzzy machine selection approach. In the first step, the...
Christopher Johnston Downie, Taoxin Peng
Pages: 11 - 23
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even more significant as we immerse ourselves into the era of big data, leading to an economy heavily reliant on data mining and precise,...
Kailong Zhang, Panfei Zuo, Liang Hu, Xiao Wu, Kejian Miao
Pages: 12 - 21
Real-time networks, such as industrial network, field bus and so on, have been becoming one vital component to develop large-scale and cooperative embedded systems. As one important branch, the wireless mode of realtime networks also raises more and more attentions in recent years since its conveniences...
Sinan Chen, Sachio Saiki, Masahide Nakamura
Pages: 16 - 24
To provide affordable context recognition for general households, this paper presents a novel technique that integrate image-based cognitive Application Program Interface (API) and light-weight machine learning. Our key idea is to regard every image as a document by exploiting “tags” derived by the API....
Myung Hwa Kim, Ju Hyung Kim, Kyoungjin Lee, Gwang-Yong Gim
Pages: 19 - 24
As COVID-19 enters the pandemic stage, the resulting infections, deaths and economic shocks are emerging. To minimize anxiety and uncertainty about socio-economic damage caused by the COVID-19 pandemic, it is necessary to reasonably predict the economic impact of future disease trends by scientific means....
Kar-Ann Toh
Pages: 20 - 28
A novel learning approach for a composite function that can be written in the form of a matrix system of linear equations is introduced in this paper. This learning approach, which is gradient-free, is grounded upon the observation that solving the system of linear equations by manipulating the kernel...
Naoshi Sakamoto
Pages: 21 - 30
In order to communicate in cipher over IP multicast, each of joining and leaving participants causes renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH, one of the key management systems, uses a tree structure to manage keys to share with participants. Every...
Marcel-Titus Marginean, Chao Lu
Pages: 22 - 36
The usage of well-tried software design patterns and application frameworks is often encountered in Mission and Safety Critical Applications development due to the high stakes involved in the case of failures. To increase reliability, some frameworks attempt to separate the implementation of business...
Nicklaus Rhodes, Shankar Banik
Pages: 22 - 31
In certain types of Internet applications, multicasting with Quality of Service (QoS) optimizations are required on both the end-to-end delay from the source to the destinations, as well as the difference in the end-to-end delay between the destinations. Examples of these applications include video-conferencing,...
Parul Dawar, N.S. Raghava, Asok De
Pages: 24 - 34
Antenna parameter optimization using S-shaped metamaterial embedded in antenna substrate at high frequency (THz) is elucidated in this paper. Upon incorporation of proposed metamaterials’ array inside the antenna substrate, bandwidth of antenna increases by 770 GHz and directivity by about 11%. Results...
Myungmuk Kang, Okjoo Choi, Juhwan Shin, Jongmoon Baik
Pages: 25 - 36
In order to develop highly reliable software in a cost-effective manner, it is necessary to manage software reliability at the early test phases. Most of developers at those phases perform a test and debug activities together. In this paper, we propose a new reliability estimation model to manage the...
Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya, Hiroaki Hirata
Pages: 25 - 33
This paper experimentally evaluates the parallel multi-dimensional indexing system indexing data by using several multi-dimensional indexes and retrieving required data from them in parallel. A constant number of data are indexed into a sub-index. The sub-index is inserted into an index in a computational...
Si Thin Nguyen, Hyun Young Kwak, Si Young Lee, Gwang Yong Gim
Pages: 25 - 32
Beside cold-start and sparsity, developing incremental algorithms emerge as interesting research to recommendation system in real-data environment. While hybrid system research is insufficient due to the complexity in combining various source of each single such as content-based or collaboration filtering,...
Hamid Abachi, Roger Lee
Pages: 26 - 34
In todays advanced technology environment, we come across a number of research areas that require extensive data processing. These areas include but not limited to, modeling and simulation of accuracy, safety and reliability of nuclear weapons, global warming, weather forecasting, DNA computing, nanotechnology,...
Yindee Oonsrikaw, Arit Thammano
Pages: 29 - 36
In this work, we extended the original Traveling Salesman Problem (TSP) to cover not only the case of multiple vehicles but also to constrain the minimum and maximum numbers of cities each vehicle can visit. Our algorithm is a modified Ant Colony Optimization (ACO) algorithm which has the ability to...
Huitao Zheng, Yadong Mei, Kai Duan, Yuru Lin
Pages: 31 - 41
We improved the serial recursion calculation process of dynamic programming and introduced parallel dynamic programming based on stage reconstruction. Through the proposed algorithm a multistage decision problem can be repeatedly reconstructed and gradually transferred to a single stage issue. This algorithm...
Yucong Duan, Xiaobing Sun, Antonella Longo, Zhaoxin Lin, Shixiang Wan
Pages: 32 - 44
Numerous service models have been proposed in the form of ”as a Service” or ”aaS” in the past. This is especially eminent in the era of the Cloud under the term of anything as a service or everything as a service(XaaS). A unified view of XaaS can aid efficient classification of services for service registration,...
Gokou Hervé Fabrice Diédié, Boko Aka, Michel Babri
Pages: 33 - 51
Over the course of operation, a wireless sensor network can experience failures that are detrimental to the underlying application’s objectives. In this paper, we address the problem of restoring coverage ratio of a damaged area (hole) using only the neighboring nodes. Most existing solutions fail to...
Hideo Masuda, Shun Segawa, Masayuki Mori
Pages: 34 - 40
Domain Name System (DNS) is an important system for the Internet communication. DNS is a system for distributed management and operation of domain names, and it is possible to associate with the resources such as IP address, instruct the destination host of the e-mail, and so on. On the one hand, it...
Djelloul Bouchiha, Mimoun Malki, Djihad Djaa, Abdullah Alghamdi, Khalid Alnafjan
Pages: 35 - 44
Web services have become the main paradigm for the development of distributed software systems using a common set of technologies, including SOAP, WSDL and UDDI. This allows accessing to software components residing on different platforms and written in different programming languages. However, several...
Zahra Amini, Mehrdad Maeen, Mohammad Reza Jahangir
Pages: 35 - 42
Nowadays cloud computing is being highly considered by many of researchers, organizations, governments and so on. According to processing happening inside of cloud computing, some of the most important problems and challenges in cloud computing are load balancing, managing resource allocations, scheduling...
Chong Fu, Ou Bian, Hui-yan Jiang, Li-hui Ge, Hong-feng Ma
Pages: 37 - 44
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Nazia Zaman, Morshed Chowdhury
Pages: 37 - 45
Streaming applications over Mobile Ad-hoc Networks (MANET) require a smooth transmission rate. The Internet is unable to provide this service during traffic congestion in the network. Designing congestion control for these applications is challenging, because the standard TCP congestion control mechanism...
Zhihuan Yao, Xian Xu, Huiqun Yu
Pages: 37 - 42
Nowadays floor heating service is increasingly attracting both residents in cold areas and gas companies for market profits. With the aggravation of market-oriented competition, the gas companies are actively seeking service transformation. It is of great significance to gas companies to be able to forecast...
Saeed Abdel Wahab, Reem El Adawi, Ahmed Khater
Pages: 41 - 48
Testing automation is one of the challenges facing the software development industry, especially for large complex products. This paper proposes a mechanism called Multi Stage Failure Detector (MSFD) for automating black box testing using different machine learning algorithms. The input to MSFD is the...
Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
Pages: 42 - 50
We propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In order to optimize I/O performance with slight administrative workload, our system is aimed at the realization of the following two functions; (i) Run-time construction of the storage tiers from...
Myo Myo Swe, Nyein Nyein Myo
Pages: 43 - 50
Social networking sites such as Twitter, Facebook, Weibo, etc. are extremely mainstream today. Also, the greater part of the malicious users utilize these sites to persuade legitimate users for different purposes, for example, to promote their products item, to enter their spam links, to stigmatize other...
Yoohwan Kim, Ju-Yeon Jo
Pages: 43 - 52
Many cryptocurrencies rely on Blockchain for its operation. Blockchain serves as a public ledger where all the completed transactions can be looked up. To place transactions in the Blockchain, a mining operation must be performed. However, due to a limited mining capacity, the transaction confirmation...
Satoshi Kimura, Hiroyuki Inaba
Pages: 45 - 53
Intrusion Detection System(IDS) has received attention to deal with the illegal access to the network. However, IDS has a critical problem which outputs a tremendous number of logs. Analyzing these logs apply a large amount of load to a network manager. In this paper, we propose a novel visualization...
Thae Thae Yu Khine, Daisuke Mitsunaga, Koji Araki, Hua-An Zhao
Pages: 45 - 51
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Hao Qian, Daniel Andresen
Pages: 45 - 54
Scientific computational experiments often span multiple computational and analytical steps, and during execution, researchers need to store, access, transfer, and query information. Scientific workflow is a powerful tool to stream-line and organize scientific application. Numbers of tools have been...
Na Wang, Haihui He, DongQian Liu
Pages: 46 - 52
Event monitoring and determination is a popular application in WSN. Considering the special circumstance that some nodes of the wireless sensor network are faulty, a fault tolerant schema for data aggregation based on event clustering was proposed. Also, an improved HRTS algorithm named T-HRTS which...
Vladimir A. Faerman, Valeriy S. Avramchuk
Pages: 49 - 57
The article is devoted to a survey of the known basic Time-Delay Estimation (TDE) methods in the application for detecting fluid leaks in pipeline transport and distribution systems. In the paper, both active and passive estimation methods are considered with respect to the presented generalized classification....
Chao Lu, Xinkai Li
Pages: 51 - 59
Our research group has been working on the P-adic theory and its implementation. Based on the Chinese Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to realize rational calculation. With this data type all rational number operations are converted...
Zin Mar Kyu, Naw Lay Wah
Pages: 51 - 58
The semantic role labeling plays a key role to extract semantic information from language text for the purpose of information retrieval, text summarization, plagiarism test, etc. This paper presents two main parts: MynNet and semantic role labeling. MynNet, which is a FrameNet for Myanmar language is...
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara
Pages: 52 - 61
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Masaki Narita
Pages: 52 - 58
We are experiencing the true dawn of an Internet of Things society, in which all things are connected to the Internet. While this enables us to receive a wide variety of useful services via the Internet, we cannot ignore the fact that this means the number of devices targeted for Internet attacks has...
Kuo-Yi Chen, Fuh-Gwo Chen
Pages: 53 - 60
Multi-core processors are becoming widely deployed. However, more cores consume more power. A power saving technique for multi-core systems based on the observation of critical sections is proposed. Since only one thread works in a critical section, other threads on other cores that access the same resource...
Taketo Tsunoda, Hironori Washizaki, Yosiaki Fukazawa, Sakae Inoue, Yoshiiku Hanai, Masanobu Kanazawa
Pages: 53 - 62
Previous studies have researched how developer experience affects code quality, but difficulty was ignored although experienced developers are more likely to work on more complex parts of a project. We examine work difficulty by focusing on revised files. Using product metrics, we evaluate file complexity...
Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du
Pages: 54 - 69
The service value broker(SVB) pattern integrates business modeling, knowledge management and economic anal- ysis with relieved complexity, enhanced reusability and effi- ciency,etc. The study of SVB is an emerging interdisciplinary subject which will help to promote the reuse of knowledge, strategy and...
Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn
Pages: 55 - 64
Information Retrieval system plays an essential role in web services. However, the web services in which users can upload files as attachments typically do not support enough search conditions and often rely only on the title or the description that the users provide during upload. We present a topic-model...
Cong Jin, Junhao Wang, Jin Wei, Lifeng Tan, Shouxun Liu, Wei Zhao, Shan Liu, Xin Lv
Pages: 58 - 66
Optimal transport distance, otherwise known as Wasserstein distance, recently has attracted attention in music signal processing and machine learning as powerful discrepancy measures for probability distributions. In this paper, we propose an ensemble approach with Wasserstein distance to integrate various...
Kyi Pyar Zaw, Zin Mar Kyu
Pages: 59 - 67
This paper publicizes the character segmentation and recognition of the Myanmar warning text signboard images taken by a mobile phone camera in natural scene. In this system, two templates are created. The first template that contains both connected pixel words and characters are used for character segmentation...
Khaled Matrouk, Kholoud Alatoun
Pages: 59 - 74
Over the last recent years, applications related to the internet of things have become the most important techniques in the world that facilitate interactions among humans and things to enhance the quality of life. So, the number of devices used in these applications will increase, leading to the creation...
Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its low...
Anbao Wang, Bin Zhu
Pages: 61 - 71
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node localization technology is one of the difficult...
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 62 - 70
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Lilia Lazli, Mounir Boukadoum
Pages: 63 - 77
Brain tissue segmentation is one of the most important parts of clinical diagnostic tools. Fuzzy C-mean (FCM) is one of the most popular clustering based segmentation methods. However FCM does not robust against noise and artifacts such as partial volume effect (PVE) and inhomogeneity. In this paper,...
Chikatoshi Yamada, D. Michael Miller
Pages: 65 - 74
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....
Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Pages: 67 - 75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....
Sylvanus A. Ehikioya, Adepele A. Olukunle
Pages: 68 - 84
Every distributed system requires a secure environment for its users. Security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example of a distributed system in which security is of a high priority. It is important that...
Dongxu Jin, JooSeok Song
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed scheme utilizes unmodifiable physical measurements of beacon messages. To increase...
Ahmad Alomari
Pages: 70 - 77
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Elliptic...
Santoso Wibowo, Srimannarayana Grandhi
Pages: 71 - 79
Evaluating the performance of recoverable end-of-life products with respect to a set of specific criteria is challenging. This is due to multi-dimensional nature of the decision making process, multiple evaluation criteria, and subjective and imprecise assessments. To effectively deal with this issue,...
Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...
Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu
Pages: 75 - 84
Many efficient deployments of large-scale wireless sensor networks based on the tree-based community rise into view recently. Sensor nodes are severely resource constrained, and lack sophisticated defense mechanisms to fight virus attacks. Cyber viruses spread through node populations over the networks,...
Xianhong Xu
Pages: 76 - 85
Supply-side reform has provided opportunities for China’s industrial economic growth, but also experienced unprecedented challenges. Based on the background of supply-side reform, this paper applies the supply-side theory. First, it explores the mechanism between industrial overcapacity and economic...
Shailendra Singh, Sanjay Silakari
Pages: 78 - 90
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy...
Pyae Phyo Thu, Than Nwe Aung
Pages: 78 - 87
Recognition of satirical language in social multimedia outlets turns out to be a trending research area in computational linguistics. Many researchers have analyzed satirical language from the various point of views: lexically, syntactically, and semantically. However, due to the ironic dimension of...
Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...
Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity....
Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 80 - 92
Despite an increase in energy efficiency of WSNs research in couple of last years, still the key challenge in the design of WSNs remains to maximize the quality of service (QoS) and energy efficiency of network system. The layered strength and functionality collaboration is commonly considered as one...
Ayako Hayashi, Teruhisa Hochin, Hiroki Nomiya
Pages: 85 - 95
This paper proposes archaeological distribution map system sharing archaeological information. Many archaeologists want to analyze the distribution of relics and/or remains. Excavation information, however, cannot be opened until verification and research are completed. Archaeological information sources...
Mohammad Asadul Hoque, Chad Davidson
Pages: 85 - 92
Recent advances in smartphones and affordable open-source hardware platforms have enabled the development of low-cost architectures for Internet-of-Things (IoT)-enabled home automation and security systems. These systems usually consist of sensing and actuating layer that is made up of sensors such as...
Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Pages: 86 - 93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Sylvanus A. Ehikioya, Cong Zhang
Pages: 88 - 98
Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure,...
Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...
Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and normal-nodes. A reception-node receives data for insertion. A representative-node...
Shinya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 91 - 99
We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay,...
Bowen Chen, Lei Jiang, Qun Zhang
Pages: 93 - 100
In UWB-IR signal detection, the threshold of signal to noise ratio(SNR) limit the performance of FHN model detection method, from this point, wavelet packet is introduced into FHN model, a novel UWB-IR signal detection method based on wavelet packet and FHN model is proposed, in addition, the disadvantages...
Arti Sharma, Mohammad Salim
Pages: 93 - 99
Polar code is considered as a major breakthrough of past decade in channel coding area. The unprecedented performance of polar codes compelled third generation partnership project (3GPP) to adopt the polar codes for control channels functions in one of the fifth generation (5G) scenario enhanced mobile...
Yang Liu, Rui Li
Pages: 94 - 107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Jingpeng Wang, Jie Huang, Mi Li
Pages: 96 - 105
Exorbitant computation cost hinders the practical application of recommendation algorithm, especially in time-critical application scenario. Although experiments show that recommendation algorithm based on an integrated diffusion on user-item-tag tripartite graphs can significantly improve accuracy,...
Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...
Norshazrul Azman bin Sulaiman, Hideo Masuda
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration...
Regitha M.R., Varghese Paul, Shailesh Sivan, Nijo Antony
Pages: 99 - 107
Seryvuth Tan, Phearin Sok, Keecheon Kim
Pages: 100 - 107
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will...
Ruiling Gao, Alva Couch, Chorng Hwa Chang
Pages: 101 - 112
In this paper, we investigate the sensor localization problem and present Stochastic Radio Interferometric Positioning System with Unsynchronized Modulated Signals (SRIPS_UMS). Previous radio interferometric positioning methods have limitations include (1) strict hardware requirements for Received Signal...
Kenji Nozaki, Teruhisa Hochin, Hiroki Nomiya
Pages: 100 - 106
Instance-based schema matching is to determine the correspondences between heterogeneous databases by comparing instances. Heterogeneous databases consist of an enormous number of tables containing various attributes, causing the data heterogeneity. In such cases, it is effective to consider semantic...
Shota Imai, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 106 - 115
We propose an extended Web displaying system based on multiple tablet devices to help users to conduct collaborative works anywhere without a large display. Users can use multiple tablet devices as a pseudo mobile large display on demand by using our system. For example, users can make discussions by...
Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...
Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...
Gayoung Kim, Minjoong Rim
Pages: 108 - 117
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support...
Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...