By Topic

Computer and Information Science (ICIS), 2010 IEEE/ACIS 9th International Conference on

Date 18-20 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 161
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3014 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Message from the Conference Co-Chairs

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xx - xxiii
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xxiv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • ICIS 2010 Sponsors

    Publication Year: 2010, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2010, Page(s):xxviii - xxxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pipeline Architecture of Particle Swarm Optimization

    Publication Year: 2010, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    This paper develops pipeline architecture of particle swarm optimization with random time-varying inertia weight and acceleration coefficients (PSO-RTVIWAC) based on existing serial architecture. The proposed architecture incorporated two features to reduce calculation error and keep high speed calculation with acceptable chip area cost. First, actual hardware design is simplified. Then the pipeli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk-Oriented Group Decision Making in Multi-criteria Analysis

    Publication Year: 2010, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Evaluating and selecting alternatives from available alternatives with respect to multiple, often conflicting criteria in a group decision making setting is complex and challenging due to the risk associated with the uncertainty and imprecision existent in the human decision making process. To effectively solve this problem, this paper proposes a risk-oriented group decision making approach for ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-Based Classification System with Clustering for Automotive Engine Spark Ignition Diagnosis

    Publication Year: 2010, Page(s):17 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Most of the pattern classification systems employ AI techniques. The most popular one is multi-layer perceptron network (MLP) because of its high computational efficiency. However, there may be some drawbacks: long training time, adjustment of hyperparameters, only a single most probable classification can be returned, etc. In this paper, case-based reasoning (CBR) approach is presented to help so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Least Squares Support Vector Prediction for Daily Atmospheric Pollutant Level

    Publication Year: 2010, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    Multi-layer perceptrons (MLP) have been employed to solve a variety of problems. The practical applications of MLP however suffer from different drawbacks such as local minima and over-fitting, such that good generalization may not be obtained. Least squares support vector machines (LS-SVM), a novel type of machine learning technique based on statistical learning theory, can be used for regression... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LEAF: Leave-One-Out Forward Selection Method for Cancer Classification Using Gene Expression Data

    Publication Year: 2010, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Recent progress of bioinformatics technology has enabled large-scale screening of biomarker candidates. In this paper, we propose a new method called LEAF: LEAveone-out Forward selection method for analysis of the gene expression data. Our proposed method has made it possible to construct the ranking of informative genes using the parameter which evaluates the efficiency of the class discriminant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finger Motion Classification Using Surface-Electromyogram Signals

    Publication Year: 2010, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    The finger movement has the information about force, speed to bend and the combination of fingers. If these information is estimated, the many degrees of freedom interface can apply it. In this study, we aimed for the many degrees of freedom finger movement classification. We tried each fingers classification and the estimate of the flexural finger force using surface-electromyogram signals. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Muscle Fatigue by the Surface Electromyogram and Its Application

    Publication Year: 2010, Page(s):43 - 47
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2759 KB) | HTML iconHTML

    The muscle is moved by muscle fiber contraction receiving command from the brain. But, energy that moves muscle is not infinity. If muscle get into energy shortage, no matter how send command from the brain, muscle is not moved. Such a temporary muscular dysfunction is muscle fatigue. If muscle becomes excess fatigue condition, it may decrease work efficiency, or muscle strain. If we are able to m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of WSN Based Stable Management System

    Publication Year: 2010, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    WSN (Wireless sensor networks) based on low-power technologies is one of the important technologies currently available in constructing ubiquitous society and is applied in various fields, including, environmental monitoring, disaster management, logistics management, and home network. In this paper, we proposed a WSN-based stable management system as one of the WSN applications. This stable manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • H/S Collaborative Development of a Ubiquitous Processor Free from Instruction Scheduling and Pipeline Disturbance

    Publication Year: 2010, Page(s):57 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1612 KB) | HTML iconHTML

    Parallelism is one of fundamental concepts of recent years' trend in developing cutting edge VLSI processors in order to achieve power conscious high performance. HCgorilla is a ubiquitous processor that does not make much of high clock speed, but seeks high performance by applying the architecture of multicore and multiple pipeline. Each of two symmetric cores is composed of Java compatible media... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binary MEMS Optically Reconfigurable Gate Array

    Publication Year: 2010, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    Demand for high-speed dynamic reconfiguration for programmable devices has increased since such fast dynamic reconfiguration can increase the programmable gate array performance. To meet that demand, optically reconfigurable gate arrays (ORGAs) have been developed to achieve the fast dynamic reconfiguration. Among such studies, a MEMS ORGA has been developed. The reconfiguration can be executed no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thermal Analysis for 3D Multi-core Processors with Dynamic Frequency Scaling

    Publication Year: 2010, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    As the process technology scales down, interconnects become the performance bottleneck when designing multi-core processors. 3D IC can be a good solution for reducing the interconnection delay in the multi-core processors by stacking multiple layers connected through TSVs. However, 3D technology magnifies the thermal challenges in 3D multi-core processors. For this reason, 3D multi-core architectu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive Evaluation of Packet Flow Control Methods for a Ring Nework of Processors on Chip

    Publication Year: 2010, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    A Current design of a system-on-chip (SoC) technology is constructing under increasing demand for high performance, small size and energy-efficient design. To fulfill these demands, it is required to consider a suitable design for on chip interconnection network. In this paper, we design a prototype of communications unit (CU) for a network-on-chip (NoC) architecture based on ring processors inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Describing Structure of System Security Based on Trust and Authentication

    Publication Year: 2010, Page(s):83 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    In this paper, we propose a method by which frontline engineers in system development fields can readily describe the structure of the security of systems. This method, based on the assumption of the use of standard encryption technologies and existing cryptographic protocols, reveals hidden security threats and vulnerabilities of systems. It extracts only security elements that constitute the tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Services Security Issues in Healthcare Applications

    Publication Year: 2010, Page(s):91 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    Many research efforts are in progress for developing unified standards for Electronic Health Records. Such records can be shared for provisions of health care and research. Significant benefits can be realized when the proposed systems are used widely. Additional security requirements are crucial for their wide adoption. Patients want privacy and confidentiality. These systems will be deployed in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.