SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Fourth International Conference on Informatics & Applications (ICIA2015)
-
Adaptive Memory Matrices for Automatic Termination of Evolutionary Algorithms
Evolutionary Algorithms (EAs) still have no automatic termination criterion. In this paper, we modify a genetic algorithm (GA), as an example of EAs, with new automatic termination criteria and ...Authors: Abdel-Rahman Hedar
Year Published: Jul. 2015 | 1-11 | ICIA2015 -
Measuring Semantic Similarity in WordNet by Using Neural Network and Differential Evolution Algorithm
Semantic similarity between two words is an important problem in many applications of information retrieval and word sense disambiguation. In this paper, we calculate semantic similarity between two ...Authors: Yusuke Hiraga, Tad Gonsalves
Year Published: Jul. 2015 | 12-17 | ICIA2015 -
Strongly Unforgeable Revocable Certificateless Signature
Certificateless public-key systems (CL-PKS) were introduced to simultaneously solve the key escrow problem in ID-based public-key systems and eliminate the need of certificates in traditional ...Authors: Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Ying-Hao Hung
Year Published: Jul. 2015 | 18-31 | ICIA2015 -
Statistical Analysis Between Malware and Benign Based on IA-32 Instruction
Malicious software is one of the serious threats in the information society. A natural result of evolved malicious software, techniques for detecting malicious software are also in progress. Based on ...Authors: Dongwoo Kang, Donghoon Lee, Jaewook Jung, Dongho Won
Year Published: Jul. 2015 | 32-42 | ICIA2015 -
An Approach for Signal Discrimination Based on Category-Preserving BoW
This study proposes a novel category-preserving bag-of-words model for 1D signals discrimination (CPBoW-1D). In the proposed CPBoW-1D, the Taguchi’s quality engineering method was used for ...Authors: Yu-Hsiang Hsiao
Year Published: Jul. 2015 | 43-50 | ICIA2015 -
Research on Large Scale Data Sets Categorization Based on SVM
Support Vector Machines algorithms are not appropriate for the large data sets because of high training complexity. To address this issue, this paper presents a two stage SVM classification algorithm ...Authors: Yongli Li, Liyan Dong, Minghui Sun, Hongjie Wang, Le Huang, Xinxin Wang, Meichen Dong
Year Published: Jul. 2015 | 51-61 | ICIA2015 -
Association Rules Selection Approach Based on Interesting Measures
In recent years, the size of data collection becomes growing significantly. The knowledge results in term of association rules obtained from the set of data are numerous and difficult to select. This ...Authors: Pakorn Leesutthipornchai
Year Published: Jul. 2015 | 62-67 | ICIA2015 -
An Approach to Extract Sentimental Messages from Twitter and its Application to Categorization of Human Group - Trial Visualization of Relation between Sentimental Tweeting and Behaviour of School Days -
Recent years have found that social media analysis can bring several kinds of effective results to us in the domains of industries, education, social science, economics, and so on. Such approaches, ...Authors: Masakazu Kyokane, Yoshiro Imai
Year Published: Jul. 2015 | 68-74 | ICIA2015 -
Analyzing Patient Value by Modifying RFM Model With Consideration of The Limitation of Service Throughput: An Investigation of Dental Health Care
The Requency-Frequency-Monetary (RFM) model was commonly used to describe customer value. However, there are some deficiency in the RFM model and should be overcame. This study proposed a new concept ...Authors: Wen-Jen Chang, Yen-Hsiang Chang, Chun-Li Lin
Year Published: Jul. 2015 | 75-82 | ICIA2015 -
An Efficient Ant Colony Optimization for Two-dimensional Bin Packing Problem with Defect Issue
In various industries, manufacturers must cut rectangular items from stock sheets. In the actual setting, stock sheets inevitably contain some defects, and manufacturers have to avoid cutting the ...Authors: Hao-Chun Lu, Yi-Siao Wan, Yu-Ting Shueh
Year Published: Jul. 2015 | 83-88 | ICIA2015 -
A Cloud-assisted P2P Video Streaming Architecture for Scalable Video Coding
Cloud computing and peer-to-peer live video streaming are important research topics of Internet multimedia services. Due to the unstable wireless data transmission and peers' joining and leaving ...Authors: Tz-Heng Hsu, Lin-You Wu
Year Published: Jul. 2015 | 89-94 | ICIA2015 -
Design of a Novel Video on Demand System in a CDN and P2P Hierarchical Overlay Network
With the vigorous development of Internet technologies, people can already obtain the highquality audio and video streams based on the growing network fast speed. Video on Demand (VoD) services is ...Authors: Hui-Kai Su, Ching-Ting Huang, Jui-Pin Tseng, Cheng-Shong Wu, Yuan-Sun Chu, Kim-Joan Chen
Year Published: Jul. 2015 | 95-100 | ICIA2015 -
Validating the TAM Constructs with Behavioural Usage of Facebook
This article investigates if the TAM (Technology Acceptance Model), which has been a widely used model for predicting user acceptance of innovations, is still effective for the innovation that has ...Authors: Pita Jarupunphol, Wipawan Buathong
Year Published: Jul. 2015 | 101-109 | ICIA2015 -
A Support System to Browse Web News using Google Maps for Elementary School Children in Japan
Education that takes advantage of the newspaper as teaching materials called NIE (Newspaper In Education) is attracting attention in many elementary schools around the world. In general, teachers ...Authors: Akifumi Kuroda, Kazuaki Ando
Year Published: Jul. 2015 | 110-114 | ICIA2015 -
Development of Web-based Computer Algebra System and its Application to Higher Education
Mathematics is one the most important subjects during school days of the world educational institutes. And handling mathematical objects at user's facilities easily is much more important for ...Authors: Keiichi Shiraishi, Yoshiro Imai
Year Published: Jul. 2015 | 115-120 | ICIA2015 -
On Fraud Detection Method for Narrative Annual Reports
Annual reports present the activities of a listed company in terms of its operational performance, financial conditions, and social responsibilities. These reports also provide valuable reference for ...Authors: Yuh-Jen Chen
Year Published: Jul. 2015 | 121-129 | ICIA2015 -
Real-time Caption Detection and Localization in TV Programs via Stroke Width Transform and Morphological Transform
Captions in TV programs are important clues for video content analysis, indexing, and retrieval. However, it is difficult to extract due to complex background, unknown caption color, etc. ...Authors: Jianghua Cheng, Gui Gao, Xishu Ku, Jurong Liu, Yongfeng Guan
Year Published: Jul. 2015 | 130-135 | ICIA2015 -
The Application of Facial Expression Recognition to the Evaluation of Abstract Graphics
While designing abstract graphics, designers transform original objects by selecting certain elements to emphasize individual concepts and preserve the original content. It is crucial for the ...Authors: Chih-Hsiang Ko, Chia-Yin Yu
Year Published: Jul. 2015 | 136-145 | ICIA2015 -
Robust Local Graph Structure for Texture Classification
Local Binary Pattern (LBP) is one of the most popular operators in computer vision and digital image processing due to its simplicity and unique property of capturing local features. Yet, the local ...Authors: Housam Khalifa Bashier, Lau Siong Hoe, Pang Ying Han
Year Published: Jul. 2015 | 146-151 | ICIA2015 -
Visual Object Tracking Based on Dynamic Weights and Gaze Density
This study proposes an adaptive algorithm for tracking objects based on the dynamic weights scheme and gaze density. The proposed adaptive algorithm is to amend the deficiency on tracking moving ...Authors: Hui-Hui Chen, Chiao-Wen Kao, Yun-Ting Huang, Bor-Jiunn Hwang, Kuo-Chin Fan
Year Published: Jul. 2015 | 152-160 | ICIA2015 -
Meaningful Object Extraction for Booking Website
This paper attempts to propose a novel approach that can obtain the interested data from extracting the web objects. Through the object extraction and analyzing the gaze distributions, the meaningful ...Authors: Shyi-Huey Wu, Chiao-Wen Kao, Hsiang-Pin Cheng, Bor-Jiunn Hwang
Year Published: Jul. 2015 | 161-169 | ICIA2015 -
Improve the Recognition Rate of Facial Expressions by Normalized Facial Features of Different Personal Face and Photo Sizes
With the advancement in camera techniques, the recognition of human facial expressions has become an important research topic in recent years. Most of the face recognition systems are trying to seek ...Authors: Shih-Lin Wu, Jun-Wei Hsu
Year Published: Jul. 2015 | 170-174 | ICIA2015 -
Multiscale Image Representation and Texture Extraction in Curvelet Framework
In order to achieve a multiscale image representation and texture extraction for textured image, a hierarchical decomposition model is proposed. Firstly, the model is replaced by the fixed scale ...Authors: Haiqing Yin, Lingling Jiang
Year Published: Jul. 2015 | 175-180 | ICIA2015 -
Image Enhancement of X-ray Bone Images Using Modified Local Histogram Equalization
Nowadays X-ray imaging is a commonly used procedure in medical diagnosis. For doctors it is very important to be able to find as much details as possible from the image. Until images were acquired in ...Authors: Primož Podržaj, Samo Simončič
Year Published: Jul. 2015 | 181-184 | ICIA2015 -
Network Analysis of Patent Infringement Lawsuits in Pharmaceutical Industry
This study proposes a systematic approach to analyze the roles of companies in pharmacy industry through the network structure of patentinfringement relationship. The influence of a company can be ...Authors: Chieh-Yuan Tsai, Nguyen Ngoc An
Year Published: Jul. 2015 | 185-191 | ICIA2015 -
Interval Type-2 Complex-Fuzzy Inferential System ― A New Approach to Modeling
Fuzzy rationale has been developed to deal with imprecision in information that happens in the real world usually. L.A. Zadeh proposed the important concept of type-2 fuzzy sets 10 years after the ...Authors: Chunshien Li
Year Published: Jul. 2015 | 192-201 | ICIA2015 -
Order Quantity Derivation Based on Risk Allocation in Production Planning
Consistent decisions contribute successfully to high profits for a company or an institution. In this paper, we employ linear programming (LP) approach within the cooperative game theory framework to ...Authors: Antonio O. N. Rene, Nobuyuki Ueno, Yuki Taguchi, Koji Okuhara
Year Published: Jul. 2015 | 202-208 | ICIA2015 -
Research on Pre-warning of Copyright Risk in Information Resources
The main aim of this study is to assess the potential copyright infringement risks (CIR) in information resources by using the extension theory. At first, the analytic hierarchy process (AHP) is ...Authors: Wende Zhang
Year Published: Jul. 2015 | 209-220 | ICIA2015 -
A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment
Cloud-based data storage service has provided a lucrative option for organizations and individual users to store and manipulate their data with a relatively lower cost than traditional data storage ...Authors: Nai-Wei Lo, Che-Wei Chuang, Tzong-Chen Wu
Year Published: Jul. 2015 | 221-233 | ICIA2015 -
A Simple Secure Auditing for Cloud Storage
Cloud storage is a common service for users to store their important data in the cloud. It provides a dynamic, scalable storage place for any sort of user on-demand. From small businesses to ...Authors: Lee-Hur Shing, Marn-Ling Shing, Chen-Chi Shing, Yu-Hsuan Yeh, Yan-Zhi Hu, Shih-Ci Dong
Year Published: Jul. 2015 | 234-238 | ICIA2015 -
A Study of Offline Grouping Proof Protocol for Lightweight RFID Tags
The purpose of this study is to propose a mechanism with modified grouping proof technologies to guarantee the integrity and confidentiality of a set of Radio-Frequency Identity (RFID) tags. In some ...Authors: Hsieh-Hong Huang, Chi-Lun Liu
Year Published: Jul. 2015 | 239-244 | ICIA2015 -
The Impact of Privacy Policy 'Emphasizing differences-Layout' on User Information Recognition and Satisfaction
Recently, the threat of personal information leakage is growing, so the importance of legal duty of privacy policy is getting attention as well. As government makes indication of privacy policy on ...Authors: Seyoon Ma, Sunoon Jeong, You-Chin Park
Year Published: Jul. 2015 | 245-249 | ICIA2015 -
Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function
In a collaborative workflow platform, when a group leader receives a document which requires cooperators’ support, she/he assigns the task to the cooperators. Each cooperator can modify the ...Authors: Chun-I Fan, Yu-Chi Lin, Yi-Fan Tseng, Jheng-Jia Huang
Year Published: Jul. 2015 | 250-259 | ICIA2015 -
Comparative Study of Heavy and Light Users of Popular Smart Apps
This study theorizes and empirically analyzes the difference between heavy and light users in terms of anteceding mechanisms impacting their intention to use three different but most popular ...Authors: Kwansub Shim, Carl Changseok Yoon, Jungwoo Lee
Year Published: Jul. 2015 | 260-267 | ICIA2015 -
Carrier Sensing Scheme for Device Discovery in Bluetooth Low Energy Networks
Many researchers give attention to Bluetooth Low Energy (BLE) because it has solutions for short range communications. However, there still are many challenging issues which must be resolved before ...Authors: Jihun Seo, Yongtak Yoon, Jilong Li, Paul Chiedozie Uzoh, Kijun Han
Year Published: Jul. 2015 | 268-278 | ICIA2015 -
Application-based Energy Efficiency Evaluation for Cellular and Wi-Fi Wireless Networks Switching
The development of mobile devices (MDs) and wireless network allow the users perform many applications and entertainments. Software implementation of wireless network transmission takes lots of power ...Authors: Yean-Fu Wen, Ko-Yu Hung
Year Published: Jul. 2015 | 279-288 | ICIA2015 -
A Mathematical Model to Develop Raising and Harvesting Strategies for Chicken Production
To operate a meat chicken business, chicken farmers must select the appropriate breed of chicken and determine how many should be raised in each henhouse. This study proposes a non-linear integer ...Authors: Peng-Sheng You, Ta-Cheng Chen, Yi-Chih Hsieh, Yung-Cheng Lee
Year Published: Jul. 2015 | 289-292 | ICIA2015 -
Design of a Simulation Platform for Emergency Medical Services using Vehicular Networks
Emergence medical service (EMS) plays an important role in reducing disability and death among critically ill patients. The emerging vehicular networks (VN) offer potential for improving the quality ...Authors: Chun-Liang Lee, Sheng Wang
Year Published: Jul. 2015 | 293-298 | ICIA2015 -
The Core/Periphery Positions in Technological Network: The Affiliation Network Analysis
This paper is to explore the interactions between the focus of R&D and technological areas, and to examine how the technological network shapes the technological position in the technological ...Authors: Calvin S. Weng, Hsien-Che Lai
Year Published: Jul. 2015 | 299-313 | ICIA2015 -
Predictive Performance Balancing of Parallel Polyhedron Programs on Multicore Platforms
Nowadays multicores machines are becoming more and more common. Ideally, all the applications benefit from these advances in computer architecture. A complex challenge in parallel computing is cores ...Authors: Asma Dab, Yosr Slama
Year Published: Jul. 2015 | 314-324 | ICIA2015 -
Development of the Function which Collects Viewing History in the Support System for Dividing and Viewing Lecture Contents
The authors develop the support system for dividing and viewing lecture contents by using lecture contents metadata. This system has index function, unit/ content viewing function, and play-list ...Authors: Ryosuke Takata, Naka Gotoda, Hiroshi Murai, Toshihiro Hayashi, Rihito Yaegashi
Year Published: Jul. 2015 | 325-328 | ICIA2015 -
The Development of Presentation System for Tourist Information which Helps the Tourists to Post and Share their Comments
Recently, we face the increasing need to provide the information of tourism to tourists using ICT. In many tourist spots, the presentation system for tourist information using Internet and mobile ...Authors: Ryo Oooka, Keima Kumano, Takayuki Kunieda, Tetsuya Ikeda, Naka Gotoda, Masanobu Kii, Toshihiro Hayashi, Rihito Yaegashi
Year Published: Jul. 2015 | 329-332 | ICIA2015 -
Development of a Multimedia Share System to Provide Spot-information for Tourists by Location-based Information
In tourism, it is important to provide optimal information for tourists on the spot. Almost all of these information (Spot-information) are provided by the local government. However, the local ...Authors: Keima Kumano, Ryo Oooka, Naka Gotoda, Masanobu Kii, Toshihiro Hayashi, Rihito Yaegashi
Year Published: Jul. 2015 | 333-338 | ICIA2015