By Topic

2011 First ACIS International Symposium on Software and Network Engineering

19-20 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 35
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (418 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2011, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Keynote Address

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    Summary form only given. The paradigm in ICT has been rapidly evolved from the system tools simply operating hardware devices to more human-friendly and smarter convergence solutions helping to enhance the quality of everyday life. Media screens such as TV connected to the Internet enable interactive, personalized and customized content services, improving the accessibility of a rich collection of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Detection Method of Solder Joint Defects Using 3D Computed Tomography for IC Package Inspection

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    Recent electronics parts continue to decrease in size so that it is more likely to exhibit defects. Lately, computed tomography scanning technique has been introduced to provide useful tools for the internal inspection of electronic packages. In this paper, we presents a novel method for detecting solder joint defects in the 3D packaging devices. Our method is composed of three steps. First, mis-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Phantoms for Industrial Computed Tomography

    Publication Year: 2011, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1823 KB) | HTML iconHTML

    The increasing use of computed tomography (CT) as a diagnostic tool creates the need for an efficient means of evaluating the performance of the CT systems now in use. Usually the metal products have the defects during manufacturing and are inevitable. In the NDT system, ability for evaluate the casting defects such as cracks and pores is also very important. In the present study, several phantoms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Problem by Information Diagram

    Publication Year: 2011, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    There is many need and trial to find problem as one of processes for business and marketing. TRIZ-OTSM insists that a complex problematic situation is not a set composed of individual problems, but a network of problems according to their relationship. To find problem we analyzed two samples in informal and formal domains like Movie and Education. A sequence of finding problem is designing informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics Computation: Towards Identifying Answers from Problem Expressions

    Publication Year: 2011, Page(s):19 - 24
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    Multiple semantics may be bundled with a concept(CPT) or an expression composed of concepts. We extend an investigation on fundamental semantics from concepts of type (TYPE) and instance (INS) to reveal relationships of expressions and semantics on problem expressions vs. answers. Core semantics of unlimited and completeness are identified as classification characteristics for clarifying and forma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum of Mind: Fundamental Forces of the Universe in Natural Language Semantics

    Publication Year: 2011, Page(s):25 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Empirical findings about the phenomenology of mind gained from Free Associative Experiment, has opened a new dimension of Artificial intelligence and quantum linguistics research, allowing us to create a link between a collective unconscious level and a conscious Mind. Our research methodology included constructing a database of metaphorical stimuli, randomly presenting these to participants, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Layer Development and Design of HD Digital TV

    Publication Year: 2011, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (923 KB) | HTML iconHTML

    With the rapid development of modern digital broadcasting, television watches are not only more and more critical about the quality of the pictures users see on the television monitor, but they are also more and more diverse about their demand on the OSD (On Screen Display) operation interface of the digital television. Users not only ask for high precision of the sensor reception of signal from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • vPELS: An eLearning Social Environment for VLSI Design with Content Security Using DRM

    Publication Year: 2011, Page(s):37 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    This paper provides a proposal for personal e-learning system (vPELS) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject, say, VLSI and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Catering Quality Evaluation Design for Service/Cloud Computing through Visualized Semantics Locating

    Publication Year: 2011, Page(s):45 - 50
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    The era of servicecloud computing brings unprecedented request for quality evaluation. Existing quality evaluation usually relies on a set of organized quality properties. The organization of quality properties partially determines the quality of a quality model which usually relies on empirically accumulated knowledge and implicit understanding of the semantics relationships among quality propert... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ant Colony Optimization Based Service Flow Scheduling with Various QoS Requirements in Cloud Computing

    Publication Year: 2011, Page(s):53 - 58
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    There are a mass of researches on the issue of scheduling in cloud computing, most of them, however, are bout workflow and job scheduling. There are fewer researches on service flow scheduling. Here we propose a model of service flow scheduling with various quality of service (QoS) requirements in cloud computing firstly, then we adopt the use of an ant colony optimization (ACO) algorithm to optim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Tourism Information on Twitter for a Local City

    Publication Year: 2011, Page(s):61 - 66
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1775 KB) | HTML iconHTML

    Tourism for a local city is one of the most important key industries. The Web contains much information for the tourism, such as impressions and sentiments about sightseeing areas. Analyzing the information is a significant task for tourism informatics. In this paper, we propose a tourism information analysis system for a local city. The target resource for the analysis is information on Twitter. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Tourism Data Using Double Ranking

    Publication Year: 2011, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The prompt discovery and mining of user's reputation, opinion and complaint are becoming a hot topic in the field of search engine for Blog and Twitter. This paper proposes "Double Rank" method to analyze the search result using two viewpoints, where the polarity degree of keywords in the search results are evaluated from the viewpoints. Most previous researches concern mainly in positive and nega... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and Disambiguation of Name of Place from Tourism Blogs

    Publication Year: 2011, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    By development of the Internet in recent years, tourism portal sites and blog articles about tourism increased on WWW. Acquisition of various tourism information became easy. When gathering and classifying the information automatically from blog articles, it is not easy to decide automatically place names used as the key. In this paper, we propose a method of extracting place names from blog artic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Fall Detection Approach Based on Cost Sensitivity Analysis

    Publication Year: 2011, Page(s):81 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Falling may cause serious injury, especially for the elderly, it had been proven that fall detection system using wearable devices based on tri-axial accelerator is effective and feasible. Most of the time, fall do not lead damage immediately, but the psychological burden after fall and other environment factors, could bring on serious damage when the elderly cannot get timely help. To deal with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing the Structure and Behaviour of Context-Aware Systems in Bigraphs

    Publication Year: 2011, Page(s):89 - 94
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Context-aware Computing has been one of the important aspects of Ubiquitous Computing, Cloud Computing, Cyber-physical Systems, etc., recently. To date, very few works can be found on formal approaches for this area. Bigraph and its related theories are introduced to formalize the modeling of context-aware systems in this paper. We use bigraphs to model the structure of context-aware system, where... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.