SNS. Selection of news story series based on the responses by SNS users for the summarization of multiple news videos

Size: px
Start display at page:

Download "SNS. Selection of news story series based on the responses by SNS users for the summarization of multiple news videos"

Transcription

1 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. SNS, SNS SNS SNS SNS Selection of news story series based on the responses by SNS users for the summarization of multiple news videos Kosuke KATO, Ichiro IDE, Daisuke DEGUCHI,, and Hiroshi MURASE Nagoya University, Graduate School of Information Science Furo-cho, Chikusa-ku, Nagoya-shi, Aichi, Japan Nagoya University, Information and Communications Headquarters Furo-cho, Chikusa-ku, Nagoya-shi, Aichi, Japan Abstract Archiving news videos is regarded as important since they are valuable as sources of important social information. When exploiting archived news videos as information sources, it is important to track the flow of topics to understand their contents comprehensively. Concerning it, a method that structures the chronological semantic relations between news stories, namely the topic thread structure has been proposed. It allows the understanding of the circumstance of the topic by tracking related stories one after another from the initial story. However, it imposes a user to watch many stories along the topic thread structure when it contains various topics. On the other hand, social networking services (SNS) are explosively prevalent. SNS users aim to send and receive information in which they are interested. Thus, we considered editing news videos from the viewpoint of the viewers, and we have decided to summarize multiple news videos based on the responses by SNS users. In this report, we introduce a method that selects news story series which will be used for the news video summarization. Key words News video, news video archive, SNS 1

2 1 : mediawalker 1. [1] Duygulu [2] [3] Wu [4] 2 [5] mediawalker [6] mediawalker 1 SNS SNS [7] SNS SNS SNS Kobayashi [8] Doman [9] Kobayashi Twitter Doman Twitter SNS 2. SNS SNS [5] CC w 2

3 2 w 1 10 w T r T S (i) T S (j) : T S (j) T S (i) T S (i) : T S (j) T S (i) T S (i) T S (j) 2. 2 [5] (1) C 0 = S O S = S O (2) S S c (j)(j = 1,... J) C 0 S c (j) S c (j) C 0 = S c (j) (3) S 2 (4) 2. 3 Web [10] SNS Web Web SNS Web Web CC Web (1) (2) (3) (4) 2. 4 CC SNS (1) CC (2) tf-idf (3) CC W CC Web W article Web SNS N i j W story (i, j) { W story (i, j) = W CC (i, j) N (if W article (i, j) = 0) (1) W story (i, j) = W CC (i, j) (otherwise) W CC (i, j) i j tf-idf W article (i, j) i Web j k j W cluster (k, j) W cluster (k, j) = W story (i, j) (2) i c k c k k

4 2013/12/05#6 2013/12/06#2 2013/12/09#8 2013/12/10#6 2013/12/18#8 2013/12/31#3 2014/01/09#8 2014/01/06#6 yyyy/mm/dd#n 2014/01/07# /01/08# /01/09# ,080 3 CC SNS SNS NHK 7 Web NHK NEWSWEB SNS Facebook SNS (1) N = SNS a SNS b SNS , , , , , , , , , , a SNS b SNS , , ,

5 4 3 a SNS b SNS , , , , , , , , , , ,296 36,960 34,750 31,448 23,843 22,547 19,238 16,342 15,922 15,393 13,029 11,700 11,537 11,072 9,484 9,072 8,935 8,255 8,136 7, a 1 b 2 c 3 46,296 2,472 7,550 36,960 1,552 5,917 34,750 1,342 5,234 31, ,775 23, ,328 20, ,078 18, ,352 16, ,343 15, ,309 15, ,272 12, ,222 11, ,140 11, ,130 11, ,098 9, ,095 9, ,041 8, , , , t t =

6 7 2013/12/05#6 16, /12/05#6 24, /12/05#6 13, /12/06#2 12, /12/06#2 14, /12/06#2 18, /12/06#2 18, /12/06#2 11, /12/06#2 12, /12/18#8 12, /12/18#8 13, SNS Web SNS tf-idf SNS [6] Ichiro Ide, Tomoyoshi Kinoshita, Tomokazu Takahashi, Shin ichi Satoh, and Hiroshi Murase, mediawalker: A video archive explorer based on time-series semantic structure, Proc. 15th ACM Int. Conf. on Multimedia, pp , Sept [7] 23 h23/html/nc html [2014/8/3 ] [8] Takashi Kobayashi, Tomokazu Takahashi, Daisuke Deguchi, Ichiro Ide, and Hiroshi Murase, Detection of biased broadcast sports video highlights by attribute-based tweets analysis, Proc. 19th Int. Conf. on Multimedia Modeling, Lecture Note in Computer Science, Vol.7733, pp , Jan [9] Keisuke Doman, Taishi Tomita, Ichiro Ide, Daisuke Deguchi, and Hiroshi Murase, Event detection based on Twitter Enthusiasm Degree for generating a sports highlight video, 22nd ACM Int. Multimedia Conf. (ACM MM2014), Nov (To appear). [10],,,, SNS Web MVE , Mar [1] Vol.64 No.3 pp Mar 2010 [2] Pinar Duygulu, Jia-Yu Pan, and David A. Forsyth, Towards auto-documentary: Tracking the evolution of news stories, Proc. 12th ACM Int. Conf. on Multimedia, pp , Oct [3] Jonathan G. Fiscus and George R. Doddington, Topic detection and tracking evaluation overview, In James Allan, ed Topic detection and tracking: Event-based information organization, Kluwer Academic Publishers, pp.17 32, [4] Xiao Wu, Chong-Wah Ngo, and Qing Li, Threading and auto documenting news videos, IEEE Signal Processing Mag., Vol.23, No.2, pp.59 68, Mar [5] Vol.23 No.5 pp Sept

Low-resolution Character Recognition by Video-based Super-resolution

Low-resolution Character Recognition by Video-based Super-resolution 2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro

More information

Shogo Kumagai, Keisuke Doman, Tomokazu Takahashi, Daisuke Deguchi, Ichiro Ide, and Hiroshi Murase

Shogo Kumagai, Keisuke Doman, Tomokazu Takahashi, Daisuke Deguchi, Ichiro Ide, and Hiroshi Murase Detection of Inconsistency between Subject and Speaker based on the Co-occurrence of Lip Motion and Voice Towards Speech Scene Extraction from News Videos Shogo Kumagai, Keisuke Doman, Tomokazu Takahashi,

More information

Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior

Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Kenji Yamashiro, Daisuke Deguchi, Tomokazu Takahashi,2, Ichiro Ide, Hiroshi Murase, Kazunori Higuchi 3,

More information

Analysis and Visualization with Large Scale Temporal Web Archives

Analysis and Visualization with Large Scale Temporal Web Archives 1 st Int. Alexandria Workshop (15th. Sep. 2014) Multiple Media Analysis and Visualization with Large Scale Temporal Web Archives Masashi Toyoda Center for Socio Global Informatics, Institute t of Industrial

More information

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV) LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30

More information

An Online Automated Scoring System for Java Programming Assignments

An Online Automated Scoring System for Java Programming Assignments An Online Automated Scoring System for Java Programming Assignments Hiroki Kitaya and Ushio Inoue Abstract This paper proposes a web-based system that automatically scores programming assignments for students.

More information

Image Resolution Enhancement Methods for Different Applications

Image Resolution Enhancement Methods for Different Applications International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1733-1738 International Research Publications House http://www. irphouse.com Image Resolution

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} PSNR_Y

More information

Text Analytics The three-minute guide

Text Analytics The three-minute guide Text Analytics The three-minute guide Text Analytics The three-minute guide 1 What is text analytics? Detecting hidden signals There s a good chance that your organization is awash in unstructured, text-rich

More information

ConTag: Conceptual Tag Clouds Video Browsing in e-learning

ConTag: Conceptual Tag Clouds Video Browsing in e-learning ConTag: Conceptual Tag Clouds Video Browsing in e-learning 1 Ahmad Nurzid Rosli, 2 Kee-Sung Lee, 3 Ivan A. Supandi, 4 Geun-Sik Jo 1, First Author Department of Information Technology, Inha University,

More information

Visualization and Analytical Support of Questionnaire Free-Texts Data based on HK Graph with Concepts of Words

Visualization and Analytical Support of Questionnaire Free-Texts Data based on HK Graph with Concepts of Words Visualization and Analytical Support of Questionnaire Free-Texts Data based on HK Graph with Concepts of Words Daisuke Kobayashi, Tomohiro Yoshikawa and Takashi Furuhashi Nagoya University, Japan Furo-cho,

More information

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

Social-Sensed Multimedia Computing

Social-Sensed Multimedia Computing Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors

More information

Security and Trust in social media networks

Security and Trust in social media networks !1 Security and Trust in social media networks Prof. Touradj Ebrahimi touradj.ebrahimi@epfl.ch! DMP meeting San Jose, CA, USA 11 January 2014 Social media landscape!2 http://www.fredcavazza.net/2012/02/22/social-media-landscape-2012/

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Mobile cloud computing for building user centric mobile multimedia recommended system

Mobile cloud computing for building user centric mobile multimedia recommended system ISSN: 2347-3215 Volume 3 Number 5 (May-2015) pp. 134-144 www.ijcrar.com Mobile cloud computing for building user centric mobile multimedia recommended system N. Rajashekarareddy and C.N. Navya* Department

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

Social media has recently played a critical

Social media has recently played a critical C Y B E R - P H Y S I C A L - S O C I A L S Y S T E M S Editor: Daniel Zeng, University of Arizona, zeng@email.arizona.edu Harnessing the Crowdsourcing Power of Social Media for Disaster Relief Huiji Gao

More information

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by

More information

The Development of School Websites Management System and Its Trials during School Field Work in a Distant Place

The Development of School Websites Management System and Its Trials during School Field Work in a Distant Place 152 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.11, November 2006 The Development of School Websites Management System and Its Trials during School Field Work in a Distant

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094 Title Rate control algorithms for video coding Author(s) Ng, Cheuk-yan; 吳 卓 恩 Citation Issued Date 2000 URL http://hdl.handle.net/10722/31094 Rights The author retains all proprietary rights, (such as

More information

Syllabus Subject: Relational, Direct and Interactive Marketing (II) Degree: Titulación Superior en Dirección de Marketing y Gestión Comercial

Syllabus Subject: Relational, Direct and Interactive Marketing (II) Degree: Titulación Superior en Dirección de Marketing y Gestión Comercial Syllabus Subject: Relational, Direct and Interactive Marketing (II) Degree: Titulación Superior en Dirección de Marketing y Gestión Comercial Academic year 2012/2013 Teachers: Oscar VEGA Period of classes

More information

Unprecedented Exposure January 2014

Unprecedented Exposure January 2014 Unprecedented Exposure January 2014 * * Mobile News App Page Views:10,802,154 * ipad App Page Views:1,940,225 Page Views: 4,099,363 * Page Views 34,318,508 Visits 9,946,681 Unique Visitors 7,629,425 Video

More information

Spam Filtering in Online Social Networks Using Machine Learning Technique

Spam Filtering in Online Social Networks Using Machine Learning Technique Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India

More information

Immersive Audio Rendering Algorithms

Immersive Audio Rendering Algorithms 1. Research Team Immersive Audio Rendering Algorithms Project Leader: Other Faculty: Graduate Students: Industrial Partner(s): Prof. Chris Kyriakakis, Electrical Engineering Prof. Tomlinson Holman, CNTV

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Course Syllabus Content Strategy & Development 3357 Fall 2015

Course Syllabus Content Strategy & Development 3357 Fall 2015 Course Syllabus Content Strategy & Development 3357 Fall 2015 Course: Branding and Social Media Class Time: Tuesday, August 26th 5:30-8:30 PM Room GB 307 TR LAB: 5:30-8:30, Room GB 218 Location: U of H

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

KAMEYAMA, Wataru Professor

KAMEYAMA, Wataru Professor 31 Yingdi Xie and Jun Ohya, A Local Method for Ellipse Detection, D- - p.. 32 A- - p.. 33 D- - p.. 34 A- - p.. 35.. 36. KAMEYAMA, Wataru Professor 1 Supheakmungkol Sarin, Toshinori Nagahashi, Tadashi Miyosawa,

More information

Delay Time Analysis of Reconfigurable Firewall Unit

Delay Time Analysis of Reconfigurable Firewall Unit Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology

More information

12 months 4 quarters 1 goal

12 months 4 quarters 1 goal 12 months 4 quarters 1 goal You know you need to whip your digital marketing game into shape. But you also know budgets are tight. If you're ready to take your online marketing to the next level without

More information

Application of Stop and Play Models to the Representation of Magnetic Characteristics of Silicon Steel Sheet

Application of Stop and Play Models to the Representation of Magnetic Characteristics of Silicon Steel Sheet Title Application of stop and play models magnetic characteristics of silicon Author(s) Matsuo, T; Shimode, D; Terada, Y; S Citation IEEE TRANSACTIONS ON MAGNETICS (200 1361-1364 Issue Date 2003-05 URL

More information

VSSN 06 Algorithm Competition

VSSN 06 Algorithm Competition VSSN 06 Algorithm Competition 27. Oct. 2006 Eva Hörster, Rainer Lienhart Multimedia Computing Lab University of Augsburg, Germany Goals Get a valuable resource for the research community Foster and accelerate

More information

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System 2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Transition from Analogue Television Broadcasting to DTV. Hiroshi Seno Reception Engineering Center. Contents

Transition from Analogue Television Broadcasting to DTV. Hiroshi Seno Reception Engineering Center. Contents Transition from Analogue Television Broadcasting to DTV Hiroshi Seno Reception Engineering Center TV Service Overview and Schedule for DTV Household Penetration of Digital TV Digital TV Receiver Trend

More information

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

The Japan Society of Mechanical Engineers C 2010

The Japan Society of Mechanical Engineers C 2010 The Japan Society of Mechanical Engineers C 2010 The Japan Society of Mechanical Engineers 2010 C The Japan Society of Mechanical Engineers 2010 C The Japan Society of Mechanical Engineers C 2010 The Japan

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing ISSN No: 2454-9614 Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing L. Poornima Devi, N. Sathyabalaji * a) Department Of Computer Science and Engineering,

More information

Modeling of Information Sharing on the Business Social Media

Modeling of Information Sharing on the Business Social Media SICE Journal of Control, Measurement, and System Integration, Vol. 6, No. 2, pp. 083 087, March 2013 Modeling of Information Sharing on the Business Social Media Fujio TORIUMI, Takashi OKADA, Shuichiro

More information

AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS

AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS PAULO VILLEGAS, STEPHAN HERRMANN, EBROUL IZQUIERDO, JONATHAN TEH AND LI-QUN XU IST BUSMAN Project, www.ist-basman.org We present a system designed

More information

RESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009

RESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009 An Algorithm for Dynamic Load Balancing in Distributed Systems with Multiple Supporting Nodes by Exploiting the Interrupt Service Parveen Jain 1, Daya Gupta 2 1,2 Delhi College of Engineering, New Delhi,

More information

Communication Door: Real-Time Communication Middleware

Communication Door: Real-Time Communication Middleware Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society Communication Door: Real-Time Communication Middleware By Masahiro TABUCHI,* Kazuaki NAKAJIMA,* Akiko KAWAMOTO,* Takashi

More information

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,

More information

Building Reusable Mobile Agents for Network Management

Building Reusable Mobile Agents for Network Management IEEE TRANSACTIONS SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATION AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 350 Building Reusable Mobile Agents for Network Management Ichiro Satoh Member, IEEE, Abstract

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

The Digital Signage System Supporting Multi-Resources Schedule on an Elevator

The Digital Signage System Supporting Multi-Resources Schedule on an Elevator , pp. 219-228 http://dx.doi.org/10.14257/ijsh.2015.9.8.23 The Digital Signage System Supporting Multi-Resources Schedule on an Elevator Woon-Yong Kim and SoonGohn Kim (Corresponding Author) Department

More information

Network Virtualization Server for Adaptive Network Control

Network Virtualization Server for Adaptive Network Control Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,

More information

Interactive person re-identification in TV series

Interactive person re-identification in TV series Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu

More information

Location-Based Social Media Intelligence

Location-Based Social Media Intelligence Location-Based Social Media Intelligence ASIS Middle East Conference Dubai, UAE February 23, 2016 Don Zoufal CrowZnest Consulting, Inc. University of Chicago Presenter Donald R. Zoufal, C.P.P., ICAO AVSEC

More information

Outsourcing Tools for IT

Outsourcing Tools for IT Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2001 Outsourcing Tools for IT Wai-Ho Au Hareton Leung

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses. Brittany Wilbert Sam Houston State University 10/22/2012

Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses. Brittany Wilbert Sam Houston State University 10/22/2012 Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses Brittany Wilbert Sam Houston State University 10/22/2012 Background From 2005-2012 over 560,000,000 data breaches

More information

What Makes a Message Stick? - The Role of Content and Context in Social Media Epidemics

What Makes a Message Stick? - The Role of Content and Context in Social Media Epidemics ANU College of Engineering and Computer Science Building 108, North Road ANU, Canberra 0200, Australia Final Report for AOARD Grant 124041 What Makes a Message Stick? - The Role of Content and Context

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

Detection of Collusion Behaviors in Online Reputation Systems

Detection of Collusion Behaviors in Online Reputation Systems Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI Email: {yuhong, yansun}@ele.uri.edu Qualcomm Incorporated,

More information

Report for September 2015

Report for September 2015 Report for tember 2015 Issued tember 30, 2015 National Association of Credit Management Combined Sectors So much for that hoped for pattern of one bad month followed by a good one. This month s CMI is

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION

CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Bulgarian Journal of Science and Education Policy (BJSEP), Volume 7, Number 1, 2013 CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Khayrazad Kari JABBOUR Lebanese University, LEBANON Abstract. The

More information

Orchestration and detection of stealthy DoS/DDoS Attacks

Orchestration and detection of stealthy DoS/DDoS Attacks Orchestration and detection of stealthy DoS/DDoS Attacks Mohammedshahzan A Mulla 1, Asst prof Shivraj V B 2 Mtech - Dept. of CSE CMRIT Bangalore. Abstract The accomplishment of the cloud computing model

More information

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks! ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE

More information

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Habilitation. Bonn University. Information Retrieval. Dec. 2007. PhD students. General Goals. Music Synchronization: Audio-Audio

Habilitation. Bonn University. Information Retrieval. Dec. 2007. PhD students. General Goals. Music Synchronization: Audio-Audio Perspektivenvorlesung Information Retrieval Music and Motion Bonn University Prof. Dr. Michael Clausen PD Dr. Frank Kurth Dipl.-Inform. Christian Fremerey Dipl.-Inform. David Damm Dipl.-Inform. Sebastian

More information

PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS

PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS Martin Tomanek and Jan Juricek Department of Systems Analysis, University of Economics, Prague, Czech Republic ABSTRACT There is a lack

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

ADAPTIVE MOBILE VIDEO STREAMING AND SHARING USING CLOUD COMPUTING

ADAPTIVE MOBILE VIDEO STREAMING AND SHARING USING CLOUD COMPUTING ADAPTIVE MOBILE VIDEO STREAMING AND SHARING USING CLOUD COMPUTING 1 ASHALA VIJAY KUMAR, 2 D. PHANI KUMAR 1 Department of CSE, Sreenidhi Institute of Science and Technology, India. phani123d@gmail.com 2

More information

First Semester Arabic Fall 2009. Course Syllabus. Eliot: 103

First Semester Arabic Fall 2009. Course Syllabus. Eliot: 103 First Semester Arabic Fall 2009 Course Syllabus Scholar : Mohamed Fakhreddine Ben Slama Phone Number : 503.805.4924 E-mail : benslamm@reed.edu Meeting Time and Place: Mondays: 6:00-7:00 pm and Fridays:

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Policies-in-force exceeded 200,000 on February 12, 2014. Integrity, Comprehensiveness, Cost-Competitiveness, Convenience

Policies-in-force exceeded 200,000 on February 12, 2014. Integrity, Comprehensiveness, Cost-Competitiveness, Convenience February 14, 2014 Daisuke Iwase, President & COO LIFENET INSURANCE COMPANY (Securities Code: 7157, TSE Mothers) Policies-in-force exceeded 200,000 on February 12, 2014 Integrity, Comprehensiveness, Cost-Competitiveness,

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

General Meeting of Shareholders - Reference Documents and Procedure

General Meeting of Shareholders - Reference Documents and Procedure Securities Code: 8793 June 5, 2008 To Our Shareholders: Notice of the Convocation of the 38 th Ordinary General Meeting of Shareholders Please be advised that the 38th Ordinary General Meeting of Shareholders

More information

Concordia University Social Science Department

Concordia University Social Science Department 1 Concordia University Social Science Department PSY/HPE 422 Psychology of Sport and Physical Activity Fall Semester 2005 Room: L300 TTH 9 to 1030am Instructor: Kevin Simpson, Ph.D. Office: L116 Phone:

More information

Social Listening & Analytics:

Social Listening & Analytics: Social Listening & Analytics: A focus on TV broadcasters/producers Listening What is happening around a TV broadcast in social/online media? Analytics How is a TV broadcast performing/benchmarking? Benchmarking

More information

Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment

Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications

Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications TRIPTI SHARMA, K. G. SHARMA, B. P. SINGH, NEHA ARORA Electronics & Communication Department MITS Deemed University,

More information

Change Pattern-Driven Traceability of Business Processes

Change Pattern-Driven Traceability of Business Processes Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn

More information

Space-filling Techniques in Visualizing Output from Computer Based Economic Models

Space-filling Techniques in Visualizing Output from Computer Based Economic Models Space-filling Techniques in Visualizing Output from Computer Based Economic Models Richard Webber a, Ric D. Herbert b and Wei Jiang bc a National ICT Australia Limited, Locked Bag 9013, Alexandria, NSW

More information

Can Twitter Predict Royal Baby's Name?

Can Twitter Predict Royal Baby's Name? Summary Can Twitter Predict Royal Baby's Name? Bohdan Pavlyshenko Ivan Franko Lviv National University,Ukraine, b.pavlyshenko@gmail.com In this paper, we analyze the existence of possible correlation between

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

Idea Lab. Social Media Is a Science

Idea Lab. Social Media Is a Science Name: Phone: Idea Lab Social Media Is a Science David Searns CEO Haley Marketing Group Inc. haleymarketing.com Brad Smith Director of Search Engine Optimization and Social Media Marketing Haley Marketing

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,

More information