By Topic

2014 International Conference on Information Science & Applications (ICISA)

6-9 May 2014

Filter Results

Displaying Results 1 - 25 of 166
  • [Front cover]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2014, Page(s):1 - 13
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • List of authors

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • A Bibliographic System for Review/Survey Articles

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB) | HTML iconHTML

    This paper proposes a Bibliographic system intends to exchange bibliographic information of review/survey articles by relying on Web service technology. It allows researchers to interact with system via single service using platform-independent standard named Web service to add, search and retrieve bibliographic information of review articles in various science and technology fields and build-up a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Building Energy Management System Based on Facility Sensor Networks

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    This paper presents the structural review of a building energy management system (BEMS) based on facility sensor networks for each facility in the target building. To make BEMS works, sensors have to be installed for each facility in the target building. Sensors for each facility are connected to the data acquisition device (DAQ) and construct a sensor network. Each DAQ in a facility sensor networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloud Database Service Approach to the Management of Sensor Data

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    The management of sensor data is challenging for most scientists or engineers. A cloud database service is a novel effective approach to such data management. In this paper, we presented a SaaS service that is based on a variant of the O&M model and implemented on Google App Engine. This system was applied for the management of sensor data from the water quality monitoring of the Soyang Lake. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework of Educational App Repositories with Recommendation Powered by Social Tag Mining

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Existing remedial instruction focuses on teacher-oriented or self-learning approaches. However, we think that the tutor-based approach with the support of educational repositories can provide students with an opportunity to correct their misconceptions. In this paper, the architecture is proposed to help users find suitable educational apps in repositories for the purpose of Math tutoring. The pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heterogeneous Data Matching Algorithm with Combining First-Order Logic and Semantic Similarity

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    In this paper studies a kind of information matching method based on neural network, and the method combines first-order logic and semantic similarity to complete the table matching, using SOM+ to generate feedback neural network to complete the field matching. The method can effectively reduce the matching time complexity. And by using history match, it effectively reduces the training time of ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Knowledge-Based Energy Management Model for Smart Grid Environment

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    A knowledge-based model for energy consumption management to improve the energy efficiency of Korean apartment complex environments is proposed. This model is capable of controlling energy consumption in accordance with the characteristics of residential buildings. Korean apartment complexes are unique and varied in terms of shape, type, and use. Energy use data must be analyzed according to the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Localization Algorithm for Disaster Situation Using Flying Sensor Nodes

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Due to many reasons wireless sensor networks are preferred to tackle disaster situation but it is not possible to pre-deploy sensor networks everywhere and it may not be guaranteed that disaster won't affect the functionality of pre- deployed sensor networks. In this paper it is proposed that flying wireless sensor network is a potential candidate to handle such situation and can overfly hindrance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method to Measure the Efficiency of Phishing Emails Detection Features

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Phishing is a threat in which users are sent fake emails that urge them to click a link (URL) which takes to a phisher's website. At that site, users' accounts information could be lost. Many technical and non-technical solutions have been proposed to fight phishing attacks. To stop such attacks, it is important to select the correct feature(s) to detect phishing emails. Thus, the current work pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model for Measuring the R&D Projects Similarity Using Patent Information

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    It is important to analyze the similarity of R&D projects for efficient investments of government's budgets. In this study, we represent the methods of analyzing the similarity between R&D projects using patent information. For this, we propose a model for similarity measurement based on the set theories and probability theory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Primal-Dual Interior-Point Algorithm for Semidefinite Optimization

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    We propose a new primal-dual interior-point algorithm for semidefinite optimization(SDO) based on an eligible barrier function. New search directions and proximity measures are proposed based on the barrier function. We show that the algorithm has O(√n log(n/ε)) and O(√n(log n)log(n/ε)) complexity results for small- and large-update methods, respectively. These are the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure E-Election System

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    An E-Election system is being put forward for elections in all countries through this paper. The stated model is highly efficient in the security point of view as voter''s high security password and Iris recognition will be confirmed before the acceptance of individual''s vote in the main database of Election Commission of any country. In addition to this the model also provides the feature that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic Logical Oriented Search Based on HDWiKi

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    Various types of structured information in Chinese encyclopedia HDWiki like as Wikipedia were divided into three categories: concept, relationship and entity. This paper described a novel symbols guided search that facilitated user to format unambiguous and complex logical queries in the logic of natural language. This facilitation and understanding base on the ternary relationships exist among th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Signature Scheme for Digital Imagery

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    We propose a signature scheme for identifying a related class of images based upon the content of the images. With the proposed scheme, we represent an image to a collection of rules based upon a technique using relationships derived from the pixels of images. This collection of relationships or rules is called Finite Inductive sequences. These rules make up a collective storage structure which ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Model for Estimating Optimal Capacity of Information System

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    A system architecture design relying only on the experience of its designer varies in quality in line with the designer's personal experience and knowledge-ability. Likewise, a wrong estimation of hardware capacity ends up in waste of resources. In practice, a range of post-hoc monitoring tools are in operation, without providing any method for estimating and reflecting the performance at an early... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Enhancement in Virtual Content Distribution Network

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (986 KB) | HTML iconHTML

    In this paper, we will focus on virtual content delivery network (VCDN) that each service provider own their independent service delivery and distribution network virtually. The VCDN system is a key technology for adding flexibility to CDNs. We propose VCDN system with rateless codes to avoid computational overhead and limit increase of the streaming delay. The proposed system builds a multi-tree ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Analysis of Bio-Signals for Basic Emotions Classification: Recognition Using Machine Learning Algorithms

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The most crucial feature of human computer interaction is computers and computer-based applications to infer the emotional states of humans or others human agents based on covert and/or overt signals of those emotional states. In emotion recognition, bio-signals reflect sequences of neural activity induced by emotional events and also, have many technical advantages. The aim of this study is to cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Density Map Based Crash Analysis

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Travel path of vehicles contains valuable information on real-time traffic environment and situation. Recently, due to the technology advances, collecting travel paths of vehicles became easier. In this paper, we tried to extract the crash related information from the vehicle trajectories. We assumed that the distribution of vehicle trajectories in opposite directions will have relation with the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Independent Object-Relationship Derivation Technique Based on Object Extraction Technique

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Despite increasing demands for big data application based on the analysis of scattered unstructured data, few relevant studies have been reported. Accordingly, the present study suggests a technique enabling a sentence-based semantic analysis by extracting objects from collected web information and automatically analyzing the relationships between such objects with collective intelligence and lang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.