Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 IIAI 4th International Congress on Advanced Applied Informatics

12-16 July 2015

Filter Results

Displaying Results 1 - 25 of 157
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2649 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Message from Congress General Chair

    Publication Year: 2015, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2015, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2015, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xxi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxiv - xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Successfully Establishing Online Stores?

    Publication Year: 2015, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    In internet era, online stores and its discussions is dramatically growing. However, how to operate online stores well is confusing enterprise and scholars. The main reason is the processes to establish online store aren't enough and sufficient. Once the process is well built, which can assist companies to successfully set up online stores, then save many efforts and resources. Therefore, this res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monetary Policy Topic Extraction by Using LDA: Japanese Monetary Policy of the Second ABE Cabinet Term

    Publication Year: 2015, Page(s):8 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    In this paper, we will analyze monetary policy of the Bank of Japan, the central bank of Japan, under the second Abe Cabinet term which started in December 2012. The Bank set the "price stability target" at 2 percent in terms the year-on-year rate of change in the consumer price index in January 2013 and has made a commitment to achieving this target at the earliest possible time. The Abe Cabinet'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of User Location and Local Topics Based on Geo-tagged Text Data on Social Media

    Publication Year: 2015, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    This paper proposes a method for estimating microblogging user location to determine local topics of importance based on area-specific term cooccurrence. Geotagged information on social media has not previously been sufficient to determine local topics, however, the amount of information available on social media has continued to expand due to the widespread use of smartphones. Notably, the amount... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming Lecture Support System Linked to a Lecture Towards Non-Kanji Countries

    Publication Year: 2015, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1234 KB) | HTML iconHTML

    For students from countries which do not use kanji, learning the Japanese language, particularly the memorization of kanji, is quite difficult. Moreover, it is believed that an inability to read kanji makes it difficult to comprehend lectures. Therefore, in an effort to improve the level of comprehension of the kanji used in lectures and the content of the lectures themselves, we developed a learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacker Investigation System Triggered by Information Leakage

    Publication Year: 2015, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    While a considerable amount of research has been devoted to preventing leakage of classified information, little attention has been paid to identifying attackers who steal information. If attackers can be identified, more precise countermeasures can be taken. In this paper, we propose an attacker investigation system that focuses on information leakage. The system traces classified information in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evidential Reasoning in Annotated Logics

    Publication Year: 2015, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Annotated logics were proposed as foundations for Para consistent logic programming, and later studied as a class of non-classical logics. We propose evidential annotated logics Et for evidential reasoning which is based on beliefs and disbeliefs. We give a formal presentation of Et and introduce uncertainty and certainty degrees for practical application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BPFM: A Notation and an Approach to Homogenize Variable Business Processes for Public Services

    Publication Year: 2015, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Nowadays Public Administrations have to promptly react when the introduction of new law prescribes the provision of a new service or a change to an existing one. The law defines many information about the service to provide, including an high level Business Process and its related variability in order to permit the reuse on an abstract specification that could drive the refinement activities withi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application for e-Tourism: Intelligent Mobile Tourist Guide

    Publication Year: 2015, Page(s):40 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    This paper presents an e-Tourism application for supporting tourists in a region. The application recommends the tourist attractions that are interested to him/her based on the tourist preferences and the current situation in the region. Attractions and their descriptions & images are extracted from accessible Internet sources (like Wikipedia, Wikivoyage, Panoramio). They are ranged by the spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Extracting the Hotel Evaluations from the Comments by the Foreign Tourists with Text Mining

    Publication Year: 2015, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Online hotel reservation system is commonly used for travel planning. We usually refer to users' reviews before making reservation. However, most of reviews are not classified appropriately for travel objectives so far, and make it difficult to read whole reviews promptly. For those backgrounds, this paper provides analyzing method for use reviews to find out the characteristics of expressions acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Trust Building with Awareness Information in Virtual Teams

    Publication Year: 2015, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Working on online has been increasing with advancement of information and communication technology. The purpose of this study is to examine the effect of awareness information on trust building in a virtual team via a field experiment. Virtual team members were recruited through a crowd sourcing platform. Each team consisted of three members (editor, designer, and coder) and assigned to develop a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visitor Behavior Analysis Based on Large-Scale Wi-Fi Location Data

    Publication Year: 2015, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    The paper aims to interpret visitor behaviors by analyzing a large scale Wi-Fi location data obtained at Interop Tokyo 2014. We first detected a situation of a visitor's stay at a booth, calculated the sojourn time of the visitor and represented each visitor as a booth vector whose element value is the total sojourn time of the visitor at a booth. Then, we classified the visitors by k-Means. By us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Category Estimation of Complaint Reports about City Park

    Publication Year: 2015, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    A lot of actions have recently been taken to support Government 2.0 movement. As the number of the actions increase, many people submit greater number of complaint reports by phone or mobile devices, and make sure the situation reported with each other. According to the actions, the delay in taking action of the government side becomes more clearly identified due to overloads of the government sid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling Exponential State Space in a POMDP-based Intelligent Tutoring System

    Publication Year: 2015, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    An intelligent tutoring system (ITS) is a computer system developed to offer adaptive, one-to-one interactive tutoring. The main modules in an ITS include a student model and a tutoring model. The student model represents and tracks the student's knowledge and affective states, and the tutoring model decides tutoring actions based on the student's current states. Partially observable Markov decisi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Key Aggregate Cryptosystem in Cloud Environment

    Publication Year: 2015, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    With the rapid development of information usage in society in the recent years, cloud systems are being more frequently used by Internet users. Among the many functions of cloud systems, the uploading and downloading files are more often used. But if the numbers of files are numerous, the keys which can decrypt the downloading files are also numerous. As a result, it will increase the loading of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.