2018 3rd International Conference on Information Systems Engineering (ICISE)

4-6 May 2018

Filter Results

Displaying Results 1 - 25 of 37
  • [Title page i]

    Publication Year: 2018, Page(s): 1
    Request permission for reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2018, Page(s): 3
    Request permission for reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 4
    Request permission for reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s):5 - 8
    Request permission for reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2018, Page(s): 9
    Request permission for reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2018, Page(s): 10
    Request permission for reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2018, Page(s): 11
    Request permission for reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • An Approach for Picking T-Shape Workpiece Based on Monocular Vision

    Publication Year: 2018, Page(s):1 - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    An approach for acquiring the distribution of top workpieces of T-shape workpiece based on monocular vision is proposed in this article. Monocular vision is awfully sensitive to the variation of profile caused by factors such as shelter, reflection and shade when it is applied to sort T-shape workpieces. The real integrated distribution of top workpieces can not be detected efficiently by using th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Data Hiding Based on Medical Image Systems by Means of Histogram Strategy

    Publication Year: 2018, Page(s):6 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The privacy issue in health care application is more important. This paper presents an application in medical image for protecting patient information (called as a medical record). The reversible image-hiding scheme based on histogram shifting is mainly used for protecting medical record. In addition, we applied two parameters, linear predictor with non-uniform weight and threshold, to improve the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fusion Method of Multi-spectral Image and Panchromatic Image Based on NSCT Transform and Adaptive Gamma Correction

    Publication Year: 2018, Page(s):10 - 15
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    The purpose of remote sensing images fusion is to produce a fused image that contains more clear, accurate and comprehensive information than any single image. an image fusion algorithm incorporating gamma-corrected is proposed based on non-subsampled Contourlet transform (NSCT). Firstly, the multispectral image is transformed to intensity-hue-saturation (IHS) system. Secondly, the panchromatic im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability Evaluation of Nutrition Fact Label

    Publication Year: 2018, Page(s):16 - 20
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    The nutritional fact label (NFL) is the medium used to communicate nutritional information that help people having a balance-dietary, while there were evidences claimed that current format of NFL had an interface issues. Thus, the purpose of this study was to evaluate usability of nutrition fact label concerning people's health literacy. This study conducted a quantitative usability testing togeth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Flame Detection System Based on Embedded GPU

    Publication Year: 2018, Page(s):21 - 25
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    In the field of security monitoring, flame detection system is used to realize large-scale, high-precision and real-time monitoring. Traditional flame detection systems have many problems, such as higher cost, less flexibility, low precision, small scale and poor real-time performance. In this paper, a novel flame detection system based on embedded GPU is proposed to achieve a high-precision and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the Network Traffic Constraints for Deep Packet Inspection by Passive Measurement

    Publication Year: 2018, Page(s):26 - 32
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The Deep Packet Inspection (DPI) system examines each captured network packet to find malicious events. The quality of network traffic set an upper limit of DPI system's functionality, such as traffic integrity and asymmetric routing. To better understand these constraints on a DPI system, we setup a series of indicators to quantify these factors, these indicators can be classified as basic inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Self-Adaptation Approach for Web Service Composition

    Publication Year: 2018, Page(s):33 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Web service composition has been an active research area over the last few years. It is an important issue to replace services in the composite service that are unavailable and/or satisfy certain requirements during the execution time. In this paper, we propose a context-aware self-adaptive service composition approach to address the issue of runtime adaptation for service composition. In detail, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network

    Publication Year: 2018, Page(s):39 - 45
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    How to effectively protect the security of the shared data is a key problem to be solved urgently in wireless body area network (WBAN). Considering of the limitation on resources of sensor nodes and the diversity of potential data requestor in WBAN, we propose a multi-authority ciphertext-policy attribute-based encryption (CP-ABE) access control scheme in cloud storage environment which is provabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Detecting Telecom Fraud User

    Publication Year: 2018, Page(s):46 - 50
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Telecom fraud has been a worldwide problem with substantial annual revenue losses for many subscribers and service provider companies. To achieve effective and inexpensive detection for telecom fraud users, we propose an effective and applicable fraud user detection method based on user's Call Detail Record (CDR). The proposed method consists of two modules, namely machine learning module and temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMP: A New Mechanism to Mitigate Control-Flow Hijacking Attacks

    Publication Year: 2018, Page(s):51 - 55
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Software code written in low-level languages like C/C++ have many kinds of memory vulnerabilities (e.g., stack overflow, Use-after-free, etc.). Attackers could exploit these vulnerabilities to hijack control-flow and compromise the program. Existing defense mechanisms' (e.g., ASLR, DEP) security guarantee are incomplete, and widely studied defense mechanisms (e.g., CFI) have high overhead and stro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Source Code Review Using Machine Learning

    Publication Year: 2018, Page(s):56 - 60
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    Source code review constrains software system security sufficiently. Scalability and precision are of importance for the deployment of code review tools. However, traditional tools can only detect some security flaws automatically with high false positive and false negative by tedious reviewing large-scale source code. Various flaws and vulnerabilities show specific characteristic in source code. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Methodology for Aligning Usability and Security in Systems and Services

    Publication Year: 2018, Page(s):61 - 66
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Conflict between usability and security is a widely recognized research problem in industry and academia. Failure to design systems, which are simultaneously usable and secure, may cause incidents where human errors lead to security breaches. Academic research identifies that usability versus security conflict can be best handled at the requirement and design stage of system development. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bibliometrics Analysis of Research Literatures on Smart Library in Academic Journals of China

    Publication Year: 2018, Page(s):67 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    In this paper, we used the knowledge of bibliometrics to make a summary and analysis to the time distribution, journal distribution, author distribution,cooperation situation, key word frequency distribution, subject distribution and organization distribution of research literatures on smart library in China CNKI database from 2010 to October 2017, which revealed the overall research situation in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNS-MEBN Based Method for Situational Awareness of Ship Navigation

    Publication Year: 2018, Page(s):73 - 77
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    Situational Awareness of Ship Navigation plays an important role in the safety and security of waterway transport. However, the current ship navigation safety assessment method cannot effectively express the uncertain knowledge. In this paper we propose a method for Ship Navigation Safety based on Multi-Entity Bayesian Networks (SNS-MEBN) in order to evaluate the ship navigation safety. This could... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Personalized Book Recommendation Model for New Readers

    Publication Year: 2018, Page(s):78 - 81
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In recent years, with the improvement of computing level, it is possible to provide personalized recommendation lists for users based on user behavior. Increasing number of books in library in university has an urgent demand for personalized book recommendation. A model is established by author using collaborative filtering algorithm, and targeting students who have never borrowed books from the l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine Construction of HIV Protein Ontology

    Publication Year: 2018, Page(s):82 - 88
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1626 KB) | HTML iconHTML

    As a form of knowledge organization and expression, ontology performs an important role in knowledge integration, data mining and semantic retrieval. In this study, the related conceptions of ontology were investigated, the research status of HIV protein ontology were summarized, the ontological construction method was introduced and the construction flow of HIV protein ontology was shown in detai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Stability for the Semi Implicit Scheme for SDEs with Polynomial Growth Condition

    Publication Year: 2018, Page(s):89 - 92
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Numerical stability plays an important role in numerical analysis. The author analysis the numerical stability of the stochastic delay differential equations (SDDEs). Traditional stability theory for numerical methods applied to SDDEs requires a global Lipschitz assumption or one-side linear growth condition on the coefficients. In this paper we want to further relax the condition. Under polynomia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Prefix XML Encoding Scheme Based on Fraction

    Publication Year: 2018, Page(s):93 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    In view of the existing XML document tree encoding scheme, the dynamic updating problem of XML document can not be well supported, and a dynamic prefix encoding CSEF based on Dewey encoding and fractional encoding is proposed. On the basis of preserving the excellent features of Dewey encoding, the infinite expansibility of the score is used to realize the dynamic updating of XML documents without... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.