Export Citations
No abstract available.
Proceeding Downloads
Time series analysis of web server logs for an online newspaper
In the last decade, online newspapers have become a viable alternative to conventional hardcopy papers. Many studies have shown that digital media have increased their share of Internet audience. In this study, we use time series analysis to investigate ...
Cloud computing in academic institutions
IT plays important role in education. Cloud Computing is a new technology in the world of IT which emerged recently and began to spread rapidly. Cloud computing is an Internet-based computing services on-demand. The main goal of this paper is to ...
Applying Hadoop for log analysis toward distributed IDS
In this paper, we apply Hadoop for large-scale log analysis. Our main objective is to efficiently detect an abnormal traffic from high volume data. Due to the high volume of data traffics, the size of traffic logs is usually exceed the capacity of a ...
SETMES: a scalable and efficient tree-based mechanical scheme for multi-channel wireless data broadcast
Wireless data broadcast is a widely used approach to disseminate frequently requested data to a mass number of mobile clients. Indexing technology is a kernel strategy in wireless data broadcast systems to help clients reducing their information ...
Proposal for an optimal job allocation method for data-intensive applications based on multiple costs balancing in a hybrid cloud environment
Due to the explosive increase in the amount of information in computer systems, we need a system that can process large amounts of data efficiently. Cloud computing system is an effective means to achieve this capacity and has spread throughout the ...
Genetic swarm based robust image watermarking
This paper presents a new method for adaptive watermark strength optimization in Discrete Cosine Transform (DCT) domain. Watermarking is a method to embed secret information in the host medium. Optimal sub-band and strength selection for watermark is ...
Efficient evaluation of human-powered joins with crowdsourced join pre-filters
There are an increasing number of crowdsourcing systems that exploit the power of the crowd to solve a wide variety of problems that cannot be solved only by computers. The human-powered join is one of the core operations that appear in many ...
Knowledge retrieval in lexical ontology-based semantic web search engine
Discovery of World Wide Web data is slightly affected due to natural-language text presentation in the internet. Moreover, exponential growth of users' requirement and expectation makes the matter more critical. Coping with the overstated problem, ...
Proposal of automatic reporting system against unauthorized use of smart phone
Nowadays, Smart phones become popular. They are used various ways, e.g. as a telephone or e-mail. Furthermore, they become essential for many people who use them in business or in private use. However, a great deal of information is stored in a smart ...
Features selection approaches for intrusion detection systems based on evolution algorithms
Intrusion Detection Systems (IDSs) deal with large amount of data containing irrelevant and redundant features, which leads to slow training and testing processes, heavy computational resources and low detection accuracy. Therefore, the features ...
Implementation of relaxed ACID properties for distributed load management in the electrical power industry
The consistency of data in central databases is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System).
Distributed databases with high performance and availability do ...
Towards realistic sampling: generating dependencies in a relational database
Managing large amounts of information is one of the most expensive, time-consuming and non-trivial activities and it usually requires expert knowledge. In a wide range of application areas, such as data mining, histogram construction, approximate query ...
Improving information dissemination and collective data directory for focus group via web based system and SMS
Mobile phone technology has a great impact on today society to be in circle of connectivity. It acts as one of the commonly used communication medium in acquiring information. This paper explores the adoption of web-based Short Messaging System (SMS) to ...
Improving classification accuracy of associative classifiers by using k-conflict-rule preservation
Classification is one of the important issues in data mining. Past studies show that associative classification outperforms traditional classification techniques. The rule selection process, particularly the rule pruning mechanism, in an associative ...
Reducing computational costs of H.264/AVC for video codec in mobile devices
In video delivery system, it is known that early detection of all-zero quantized discrete cosine transform (DCT) coefficients can be used to reduce the computational cost of H.264/AVC video encoding, which is critical for mobile applications. In this ...
Target modeling for tracking and handoff in a camera network
Tracking moving objects such as human has become a major topic in video surveillance applications. Camera handoff is an important problem when using multiple cameras which have overlapping or non-overlapping field of views. However, most handoff ...
Towards a high-level trusted computing API for Android software stack
Smartphone platforms are fast becoming the de-facto method of online communication. Android is one of the most promising smartphone platforms with backing of both the finances of industry leaders and the technical skills and expertise of the open source ...
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace
Trusted computing presents a technique called remote attestation which helps in verifying the trustworthiness of a client's system. Generally known and mostly used methods to verify a target system's integrity are mostly static in nature. For the ...
Real-time Korean traffic sign detection and recognition
In this paper, we propose a real-time Korean traffic sign detection and recognition method based on color properties and shape geometries of images. The proposed method supports detecting and recognizing various shapes of traffic signs in real-time. Our ...
Real-time traffic sign detection with vehicle camera images
This paper presents a real-time traffic sign detection method using color properties and shape-based features for real-world environment applications. The proposed method has two main steps: color-based region segmentation and shape-based verification ...
Multi-label image annotation based on multi-model
Image automatic annotation is a promising and essential step for semantic image retrieval, and it's still a challenge because of the open problem of semantic gap. Recently, most of image annotation approaches paid more attention to detect single label ...
'What affects me?': a smart public alert system based on stream reasoning
Public alert services is gradually becoming popular in smart cities because this enhances the awareness of the citizen about activities within the city. Such a service also ensures the safety and security of the citizens. However the state of the art ...
Hand detection and feature extraction for static Thai Sign Language recognition
This paper proposes a method to detect and extract hand features from video sequences, where a person performs Thai Sign Language (TSL), for recognizing static TSL alphabets. First, the skin regions are segmented using trained skin color model ...
More reputable recommenders give more accurate recommendations?
Existing models of the Trust-Aware Recommender System (TARS) build personalized trust networks for the active users to predict ratings. These models have reasonable rating prediction performances, while suffer from high computational complexity. One ...
Simplified swarm optimization with differential evolution mutation strategy for parameter search
In practical applications, solving dynamic optimization problem is a challenging field. In recent decades, the optimization approach is not merely dealing with unimodal functions, but also multimodal functions. Even more, the performance of optimization ...
Multivector e-mail filtering with shape and color impression
Nowadays, e-mail becomes popular. While, e-mail is a hotbed of crimes such as fraud, computer virus and phishing by SPAM etc. Function of filtering is one of the solutions which are avoided through those troubles. However, the filtering has a problem. E-...
Looking at the effects of various multimedia approach in student learning: a case study
Who benefits from multimedia learning and under what conditions? This study examined the effects that animation and cognitive load have on student understanding of a particular chapter in operating systems as part of the syllabus of Computer Science and ...
Error-resilient packet reordering for compressed video transmission over error-prone networks
In wireless video transmission, the bursty packet losses of the channel will severely impair the reconstructed video quality. This paper presents an error-resilient packet reordering scheme to improve the error robustness of the transmitted video. ...
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP
Recently, as the use of wireless Internet increases, access point (AP) installation has increased rapidly, only to increase the total power consumed by AP in wireless local area network (WLAN). Because an AP always wakes up regardless of the real use, ...
A study of video performance analysis between Flash video and HTML 5 video
Net book belongs in the category of small, legacy-free and inexpensive portable computer. Net books typically have less powerful hardware than other laptops. Net books are used to run simple task that doesn't utilize a lot of CPU power such as word ...
Index Terms
- Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ICUIMC '14 | 407 | 116 | 29% |
ICUIMC '11 | 534 | 135 | 25% |
Overall | 941 | 251 | 27% |