SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Fifth International Conference on Informatics and Applications (ICIA2016)
-
3D-DFT Spectrum and Cepstrum of Dense Local Cubes for 3D Model Retrieval
Traditional 3D-DFT features used for 3D model retrieval often extracted the spectral/cepstral features from the spectrum/cepstrum of the holistic 3D model. These approaches seldom consider the local ...Authors: Chang-Hsing Lee, Jau-Ling Shih, Yu-Hau Liu and Chin-Chuan Han
Year Published: Nov. 2016 | 1-11 | ICIA2016 -
An FPGA-Based Tiled Display System for a Wearable Display
We developed an FPGA-based tiled display system as a wearable display. Four 15.6-inch displays are arranged in a grid and formed a single display which has an input of HDMI signal. FPGAs are used to ...Authors: Tetsu Narumi
Year Published: Nov. 2016 | 12-17 | ICIA2016 -
Robust Copy-move Forgery Detection through Invariant Moment Features
The proposed scheme uses the invariant features extracted from each block to detect the copy-move forgery regions in a digital image. In the proposed scheme, an image is first divided into ...Authors: Chien-Chang Chen, Han Wang
Year Published: Nov. 2016 | 18-25 | ICIA2016 -
Knowledge-Based Analysis of Web Data Extraction
In this research, the field of mining has organized the content across the Web by providing the models and techniques of working to achieve the integration of knowledge in a mechanism so that these ...Authors: Alaa Hassan, Marwah N. Abdullah and Nadia Naef
Year Published: Nov. 2016 | 26-32 | ICIA2016 -
Resolving The Placement Problem in a Load-balanced Environment Using a Heuristic Approach
In recent years, cloud computing technology has become one of the most significant IT infrastructures. Cloud users are increasing every day; thus, cloud must be able to handle the huge number of ...Authors: Dalal Zabin Alotaibi, Soha Zaghloul Mekki
Year Published: Nov. 2016 | 33-43 | ICIA2016 -
A Secure Conjunctive Keyword Search Using a Hierarchical Bloom Filter
In recent years, remote storage services are rapidly spreading in cloud computing. In such a system, there is often a case where a client who makes use of a cloud service wants to protect his privacy ...Authors: Hiroaki Yamamoto, Takashi Watanabe and Takashi Miyazaki
Year Published: Nov. 2016 | 44-56 | ICIA2016 -
Implementation and Trial Practices for Hacking Competition CTF as Introductory Educational Experience for Information Literacy and Security Learning
We have proposed an easy CTF event, which is "Capture the Flag" as a hacking competition. It is for an introductory educational experience of information literacy and security learning. We developed ...Authors: Makoto Nakaya, Takayuki Abe and Hiroyuki Tominaga
Year Published: Nov. 2016 | 57-62 | ICIA2016 -
Performance Evaluation of Routing Protocols in Wireless Sensor Networks: A Comparative Study
In Wireless Sensor Networks, information is routed from one sensor node to another using a variety of routing protocols, each having its own advantages and disadvantages. Despite the availability of ...Authors: Raid Zaghal, Fadi Alyounis and Saeed Salah
Year Published: Nov. 2016 | 63-70 | ICIA2016 -
An Energy-efficient Uniform-multiprocessor Scheduling for Real-time Embedded Systems
In this paper, we consider the scheduling of periodic task systems upon a uniform multiprocessor model in which the difference of each processor is their speed or computing capacity. In order to ...Authors: Da-Ren Chen, Ye-Zheng Chen, Yu Cheng-Jung and Hon-Chan Chen
Year Published: Nov. 2016 | 71-80 | ICIA2016 -
A Support System for Extensive Reading using English News on the Web
On language learning for English as a second language (ESL) learners, extensive reading is one of methods that can improve reading comprehension ability. Extensive reading is a method to read a lot ...Authors: Yuji Tanimoto, Kazuaki Ando
Year Published: Nov. 2016 | 81-87 | ICIA2016 -
Extraction of Product Names for Constructing a Database of Souvenir Information
Travelers are often bothered with choosing good souvenirs when they travel. Information about souvenirs that travelers can purchase only at the particular location or area exists on the Q&A sites, ...Authors: Noriyuki Nagao, Kazuaki Ando
Year Published: Nov. 2016 | 88-96 | ICIA2016 -
Educational Approach and Practices for an Applied C Programming Exercise with Poker Card Game Strategy and a Contest Style
We propose an applied C programming exercise with card game strategy and a contest style. We adopt a draw Poker and consider the rule regulation as an adequate theme of simple AI. We offer an ...Authors: Fumiya Gemba, Naoki Hanakawa and Hiroyuki Tominaga
Year Published: Nov. 2016 | 97-104 | ICIA2016 -
An Associative Classification Approach for Enhancing Prediction of Imbalance Data
Data mining has been received considerable interest in recent years because it can yield effective results in many applications. However, while this field has focused on developing class classifiers ...Authors: Wen-Chin Chen, Chiun-Chieh Hsu
Year Published: Nov. 2016 | 105-111 | ICIA2016 -
An Accelerated Traffic Resource Utilization
This paper discusses a traffic flow model from the viewpoint of car drivers on a single lane traffic. Then, we consider boundary and fluctuation effects which are of drivers effects. The boundary ...Authors: Isamu Shioya, Kunihide Hamasaki and Naoki Sato
Year Published: Nov. 2016 | 112-116 | ICIA2016 -
Automatic Generation of Membership Functions and Rules in a Fuzzy Logic System
Fuzzy logic is playing a significant role in many control and classification systems. This arises from its simplicity, natural language based construction, dealing with ambiguity, and its ability to ...Authors: Mohammed A. A. Refaey
Year Published: Nov. 2016 | 117-122 | ICIA2016 -
Constructing Topic Hierarchy Tree for User Interests from Multiple Knowledge Bases
Many applications benefit from discovering and analyzing the topics of interest of social network users such as recommender systems. In this paper, we propose a methodology for building a topic ...Authors: Amani H. B. Eissa, Mohamed E. El-Sharkawi and Hoda M. O. Mokhtar
Year Published: Nov. 2016 | 123-126 | ICIA2016 -
A Survey: Load Balanced Routing Techniques in Network-on-Chips
In all network types, load balancing is an essential issue that drastically affects the overall system performance. Interconnection networks are no exception. A Network-on-Chip (NoC) is one of the ...Authors: Ashwag Hamoud Alotebi, Soha Zaghloul Mekki
Year Published: Nov. 2016 | 127-133 | ICIA2016 -
Regular vs. Irregular Topologies in Networks-on-Chips: A Survey
The use of networks on chips has made it possible for computers to perform efficiently and at a high speed. This is because integrated circuits achieve a more elaborate connection between different ...Authors: Hend Ibrahim Alshaya, Soha Zaghloul Mekki
Year Published: Nov. 2016 | 134-145 | ICIA2016 -
An Efficient Algorithm for Processing Top-K Spatial Keyword Query Based on Single Quadtree Traversal
Recent years have witnessed the generation of a massive amount of spatial-textual data. In view of this, a new type of query coined spatial keyword query has been proposed to deal with the ...Authors: Hsiang-Jen Hong, Ge-Ming Chiu and Wan-Yu Tsai
Year Published: Nov. 2016 | 146-158 | ICIA2016 -
Simplifying Dynamic Programming
Dynamic Programming (DP) is one of the fundamental topics usually covered in the algorithms course. Nonetheless, it is a challenging subject for many computer science students. This paper presents ...Authors: Jamil Saquer, Lloyd Smith
Year Published: Nov. 2016 | 159-164 | ICIA2016 -
Simulation of Evacuation Behaviors from Exhibition Venues and its Application to Emergency Management
Drills for emergencies help people prepare for unexpected situations. However, it is difficult to carry out training and drills for various large-scale and realistic situations. There are also risks ...Authors: Katsuki Ichinose, Tomoichi Takahashi
Year Published: Nov. 2016 | 165-170 | ICIA2016 -
Statistical Approach to Lip Segmentation Using Local MRF Model
Lip segmentation plays an important role in a lipreading system as it is the initial part of the whole processing, and its result can directly influence the performance of feature extraction and even ...Authors: Yuanyao Lu, Tenghe Zhou, Xiaoshan Zhu and Ying Cai
Year Published: Nov. 2016 | 171-176 | ICIA2016 -
Towards Location Approximation of Disaster Related Tweets: Predicting Latitude-Longitude Level Coordinates of Tweets Using Latent Semantic Analysis
Various studies have presented ways of approximating the location of tweets through performing text mining techniques on the contents of tweets. Methodologies of this type create word density based ...Authors: John Clifford Rosales, Ma. Regina Estuar
Year Published: Nov. 2016 | 177-188 | ICIA2016