Advanced Multimedia and Ubiquitous Engineering (eBook)

Future Information Technology Volume 2
eBook Download: PDF
2015 | 1st ed. 2015
XXVI, 513 Seiten
Springer Berlin (Verlag)
978-3-662-47895-0 (ISBN)

Lese- und Medienproben

Advanced Multimedia and Ubiquitous Engineering -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas.

Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions. 



Professor James J. (Jong Hyuk) Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea.

Professor Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering. He also serves as the Dean of the College of Electrical Engineering & Computer Science for National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education on September 2009 as well.

Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. Arabnia is currently a Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, supercomputing, Big Data Analytics and applications in medical imaging, knowledge engineering, security and surveillance systems and other computational intensive problems.

Professor Neil Y. Yen received doctorates in Human Sciences at Waseda University, Japan, and in Engineering at Tamkang University, Taiwan in 2012. His doctorate in Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. He joins The University of Aizu, Japan as an associate professor since April 2012.

Professor James J. (Jong Hyuk) Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea.Professor Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering. He also serves as the Dean of the College of Electrical Engineering & Computer Science for National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education on September 2009 as well.Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. Arabnia is currently a Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, supercomputing, Big Data Analytics and applications in medical imaging, knowledge engineering, security and surveillance systems and other computational intensive problems.Professor Neil Y. Yen received doctorates in Human Sciences at Waseda University, Japan, and in Engineering at Tamkang University, Taiwan in 2012. His doctorate in Waseda University was funded by the JSPS (Japan Society for the Promotion of Science) under RONPAKU program. He joins The University of Aizu, Japan as an associate professor since April 2012.

The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secure Navigational Networks; Kwangil Lee, MoonSub Song.- A Design and Implementation of lightweight ENC for Android App; Moonsub Song, et al.- Study of Censorship in Named Data Networking; Xingmin Cui, et al.- Research on Design of LTE-based High-Speed Railway Networks in Korea: Current and emerging issues; Jin-Kyu Choi, et al.- Alternative way to manage the research documents; Jeong Ah Kim, et al.- R&D Project Management using Context in Document: Research Descriptor; Jong-Won Ko, et al.- Research Descriptor based Project Management Approach for R&D Projects; Jong-Won Ko, et al.- Attributes for Characterizing Java Methods; Illo Lee, et al.- A study on Real Time Circular Motion in Robots using Kalman Filters; Malrey Lee, et al.- A Study on Traceability Between Documents of a Software R&D Project; Suntae Kim, et al.- Path Planning for Avoiding Obstacles for Unmanned Ground Vehicles; Gyoungeun Kim, et al.- Improved AEB Performance at Intersections with Diverse Road Surface Conditions Based on V2V Communication; Sangduck Jeon, et al.- Integrated Information Retrieval for Distributed Heterogeneous Ontology System; Sang-Won Hwang, et al.- hFractal: A Cloud-assisted Simulator of Virtual Plants for Digital Agriculture; Fei Hao, et al.- Proposal and Validation of AEB System Algorithm for Various Slope Environments; Ming Lin, et al.- A Study on the Performance Analysis of a V2V-Communication-Based Autonomous Emergency Braking System for High-Speed Driving under Various Road Surface Conditions; Hyeonggeun Mun, Byeongwoo Kim.- Implementation of power off recovery scheme for block mapping FTL; Ji-Hwan Chung, Tae-Sun Chung.- PLC Monitoring and Protection for SCADA Framework; Ahmed AlShemeili, et al.- Modeling Of Smart Supply Chain For Sustainability; Kyeongrim Ahn, et al.- Human Action Classification Using Multidimensional Functional Data Analysis Method; Wanhyun Cho, et al.- Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments; Sung-Wook Park, Im-Yeong Lee.- Model of CPU-intensive Applications in Cloud Computing; Junjie Peng, et al.- A Study of Effects of UTAUT-Based Factors on Acceptance of Smart Health Care Services; Yoo-Jin Moon , Young-Ho Hwang.- Detection and recognition of road markings for advanced driver assistance system; JongBae Kim.- Color and depth image correspondence for Kinect v2; Changhee Kim, et al.- Equivalent Test Model of Wireless Optical Communication System for Automotive Environment; Sangyub Lee, et al.- Feasibility Study of Non-linear Apodization for IVUS B-mode Imaging; Jin Ho Sung, et al.- An Empirial Study of Impacts of User Intention for Smart Wearable Devieces and Use Behavior; Yoojin Moon, et al.- Lightweight Context-aware Activity Recognition; Byung Gill Go, et al.- Efficient Sliding Window Join in Data Stream Processing; Hyeon Gyu Kim.- The Effect of the User Interface Design of Smartphone Applications on Users’ Individual Experiences of Performance; Wonjin Jung.- Data Hiding for H.264/AVC Based on the Motion Vector of 16 Grids; Cheng-Hsing Yang, et al.- Idle-Time Processing in Time-Slide Window; Join               Hyeon Gyu Kim.- A Large-scale Object-based Active Storage Platform for Data Analytics in the Internet of Things; Quanqing Xu, et al.- Concurrent Regeneration Code with Local Reconstruction in Distributed Storage Systems; Quanqing Xu, et al.- A Technique for Streaming Multiple Video Parts in Parallel Based on Dash.js; Jo Yew Tham.- Prioritized Medical Image Forwarding over DTN in a Volcano Disaster; Muhammad Ashar, et al.- A Framework of Personal Data Analytics for Well-Being Oriented Life Support; Seiji Kasuya, et al.- Secure Initial Attach based on Challenge-Response Method in LTE Conforming to LTE Standards; Jungho Kang.- A Design and Development of Secure-Coding Check System Based on CVE and CWE; Hyungjoo Kim, Moonseog Jun.- Lightweight Encryption Technique for Content Security in Open IPTV Environment; Jaewoo Kim, et al.- Lightweight mutual authentication routing protocols design based on LEACH in sensor network environment; Jaeseung Lee, et al.- Method research for safe authentication in cloud environment; Jaeseung Lee, et al.- A Design of Dual Encryption Based On Data Obfuscation and Mutual Authentication in the Smart-Grid Environment; Wonkyu Choi, et al.- A Study on Realtime Detecting Smishing on Cloud Computing Environments; Ayoung Lee, et al.- Application of Data Mining for Crime Analysis; Aziz Nasridinov, et al.- Graph-based Motor Primitive Generation Method of UAVs based on Demonstration-based Learning; The study on the detection of the damaged file using the graph of the information entropy for Security Management; Chae Ho Cho, et al.- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications; Ahmed Absi, Dae-Ki Kang.- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds; Mourad Elhadef.- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis; Kauznori Wagatsuma, et al.- Idea of Personal Digital Memories using Smart Application; Martin Zmitko, Ondrej Krejcar.- Proxy based Mobility Management Scheme using Prediction Algorithm; Daewon Lee, et al.- Principles of Usability in Human-Computer Interaction; Tomas Hustak, Ondrej Krejcar.- Design and Performance Evaluation of a VANET-based Adaptive Overtaking Assistance System; Ihn-Han Bae, Jae-Kon Lee.- Vulnerability Analysis on Smartphone Fingerprint Templates; Young-Hoo Jo, et al.- Study of Measures for Detecting Abnormal Access by Establishing the Context Data-Based Security Policy in the BYOD Environment; Changmin Jo.- Incremental Multilevel Association Rule Mining of a Dynamic Database under a Change of a Minimum Support Threshold; Nophadon Pumjun, Worapoj Kreesuradej.- Compressing Method of NetCDF Files containing Clustered Sparse Matrix; Suntae Hwang, et al.- An Approach to Discovering Weighted Service Pattern; Jeong Hee Hwang, MiSug Gu.- Cyber Security Modeling for the Operation of Virtualized Trusted Networks (VTN); Yong-Hee Jeon.- Development of a quantitative evaluation method for vehicle control systems based on road information; Jinyong Kim, et al.- Design challenges and Implementation of A Shipborne Gateway for Safe and Secure Navigational Networks; Kwangil Lee, MoonSub Song.- A Design and Implementation of lightweight ENC for Android App; Moonsub Song, et al.- Study of Censorship in Named Data Networking; Xingmin Cui, et al.- Research on Design of LTE-based High-Speed Railway Networks in Korea : Current and emerging issues; Jin-Kyu Choi, et al.- Alternative way to manage the research documents; Jeong Ah Kim, et al.- R&D Project Management using Context in Document: Research Descriptor; Jong-Won Ko, et al.- Research Descriptor based Project Management Approach for R&D Projects; Jong-Won Ko, et al.- Attributes for Characterizing Java Methods; Illo Lee, et al.- A study on Real Time Circular Motion in Robots using Kalman Filters; Malrey Lee, et al.- A Study on Traceability Between Documents of a Software R&D Project; Suntae Kim, et al.- Path Planning for Avoiding Obstacles for Unmanned Ground Vehicles; Gyoungeun Kim, et al.- Improved AEB Performance at Intersections with Diverse Road Surface Conditions Based on V2V Communication; Sangduck Jeon, et al.- Integrated Information Retrieval for Distributed Heterogeneous Ontology Syste; Sang-Won Hwang,  et al.- hFractal: A Cloud-assisted Simulator of Virtual Plants for Digital Agriculture; Fei Hao, et al.- Proposal and Validation of AEB System Algorithm for Various Slope Environments; Ming Lin, et al.- A Study on the Performance Analysis of a V2V-Communication-Based Autonomous Emergency Braking System for High-Speed Driving under Various Road Surface Conditions; Hyeonggeun Mun, Byeongwoo Kim.- Implementation of power off recovery scheme for block mapping FTL; Ji-Hwan Chung, Tae-Sun Chung.- PLC Monitoring and Protection for SCADA Framework; Ahmed AlShemeili, et al.- Modeling Of Smart Supply Chain For Sustainability; Kyeongrim Ahn, et al.- Human Action Classification Using Multidimensional Functional Data Analysis Method; Wanhyun Cho, et al.- Light-weight Authentication Scheme for NFC mCoupon Service in IoT Environments; Sung-Wook Park, Im-Yeong Lee.- Model of CPU-intensive Applications in Cloud Computing; Junjie Peng, et al.- A Study of Effects of UTAUT-Based Factors on Acceptance of Smart Health Care Services; Yoo-Jin Moon , Young-Ho Hwang.- Detection and recognition of road markings for advanced driver assistance system; JongBae Kim.- Color and depth image correspondence for Kinect v2; Changhee Kim, et al.- Equivalent Test Model of Wireless Optical Communication System for Automotive Environment; Sangyub Lee, et al.- Feasibility Study of Non-linear Apodization for IVUS B-mode Imaging; Jin Ho Sung, et al.- An Empirial Study of Impacts of User Intention for Smart Wearable Devieces and Use Behavior; Yoojin Moon, et al.- Lightweight Context-aware Activity Recognition; Byung Gill Go, et al.- Efficient Sliding Window Join in Data Stream Processing; Hyeon Gyu Kim.- The Effect of the User Interface Design of Smartphone Applications on Users’ Individual Experiences of Performance; Wonjin Jung.- Data Hiding for H.264/AVC Based on the Motion Vector of 16 Grids; Cheng-Hsing Yang, et al.- Idle-Time Processing in Time-Slide Window Join; Hyeon Gyu Kim.- A Large-scale Object-based Active Storage Platform for Data Analytics in the Internet of Things; Quanqing Xu, et al.- Concurrent Regeneration Code with Local Reconstruction in Distributed Storage Systems; Quanqing Xu, et al.- A Technique for Streaming Multiple Video Parts in Parallel Based on Dash.js; Jo Yew Tham.- Prioritized Medical Image Forwarding over DTN in a Volcano Disaster; Muhammad Ashar, et al.- A Framework of Personal Data Analytics for Well-Being Oriented Life Support; Seiji Kasuya, et al.- Secure Initial Attach based on Challenge-Response Method in LTE Conforming to LTE Standards; Jungho Kang.- A Design and Development of Secure-Coding Check System Based on CVE and CWE; Hyungjoo Kim, Moonseog Jun.- Lightweight Encryption Technique for Content Security in Open IPTV Environment; Jaewoo Kim, et al.- Lightweight Mutual Authentication Routing Protocols Design Based On LEACH In Sensor Network Environment; Jaeseung Lee, et al.- Method Research For Safe Authentication In Cloud Environment; Jaeseung Lee, et al.- A Design of Dual Encryption Based On Data Obfuscation and Mutual Authentication in the Smart-Grid Environment; Wonkyu Choi, et al.- A Study on Realtime Detecting Smishing on Cloud Computing Environments; Ayoung Lee, et al.- Application of Data Mining for Crime Analysis; Aziz Nasridinov, et al.- Graph-based Motor Primitive Generation Method of UAVs based on Demonstration-based Learning; Yunsick Sung, et al.

Erscheint lt. Verlag 16.7.2015
Reihe/Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Zusatzinfo XXVI, 513 p. 233 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Technik Elektrotechnik / Energietechnik
Schlagworte Context-aware system with multimedia • Database and big data • Human-centric Computing and Social Networks • IT Management and Service • Knowledge Systems and Intelligent Agents • Multimedia and IT convergence • Multimedia Engineering • Multimedia in telemedicine • Ubiquitous and Pervasive Computing
ISBN-10 3-662-47895-1 / 3662478951
ISBN-13 978-3-662-47895-0 / 9783662478950
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 18,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Christian Denzler

eBook Download (2023)
Rheinwerk Design (Verlag)
44,90
Schritt für Schritt zu Vektorkunst, Illustration und Screendesign

von Anke Goldbach

eBook Download (2023)
Rheinwerk Design (Verlag)
39,90
Das umfassende Handbuch

von Michael Moltenbrey

eBook Download (2024)
Rheinwerk Fotografie (Verlag)
39,90