Advances in Computer Science and Ubiquitous Computing (eBook)

CSA & CUTE
eBook Download: PDF
2015 | 1st ed. 2015
XXXI, 918 Seiten
Springer Singapore (Verlag)
978-981-10-0281-6 (ISBN)

Lese- und Medienproben

Advances in Computer Science and Ubiquitous Computing -
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015.

The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy.

These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.



Professor Doo-Soon Park received his PhD in Computer Science from Korea University in 1988. Currently, he is a professor in the Department of Computer Software Engineering at Soonchunhyang University, South Korea. He is President of KIPS(Korea Information Processing Society) and Director of Central Library at Soonchunhyang University and Director of Wellness Service Coaching Center at Soonchunhyang University. He was editor in chief of JIPS(Journal of Information Processing Systems) at KIPS from 2009 to 2012. He was Dean of the Engineering College at Soonchunhyang University from 2002 to 2003, and was the Director of the u-Healthcare Research Center at Soonchunhyang University from 2006 to 2007. He has served as an organizing committee member of international conferences including CUTE 2014, CSA 2014, EMC-14, FutureTech 2014, and MUE 2014. His research interests include data mining, big data processing and parallel processing. He is a member of IEEE, ACM, KIPS, KMS, and KIISE. Contact him at parkds@sch.ac.kr.

Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. Arabnia is currently a Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, supercomputing, Big Data Analytics and applications in medical imaging, knowledge engineering, security and surveillance systems and other computational intensive problems. Most recently, he has been studying ways to promote legislation that would prevent cyber-stalking, cyber-harassment, and cyber-bullying. Dr. Arabnia is Editor-in-Chief of The Journal of Supercomputing (one of the oldest journals in Computer Science) published by Springer and has been Associate Editor of IEEE Transactions on Information Technology in Biomedicine (2008-2011). He is also on the editorial and advisory boards of 32 other journals. He is the book series editor-in-chief of 'Transactions of Computational Science and Computational Intelligence' (Springer) and editor-in-chief of the book series entitled 'Emerging Trends in Computer Science and Applied Computing' (Elsevier). Dr. Arabnia has received a number of awards; most recently (2007), he received an 'Outstanding Achievement Award in Recognition of His Leadership and Outstanding Research Contributions to the Field of Supercomputing'. This award was presented to him at Harvard University Medical School (signatories: Lawrence O. Hall, President of IEEE/SMC; Zhi-Pei Liang, Vice President of IEEE/EMB; Jack. Y. Yang, General Chair of IEEE BIBE and Harvard University; Mary Qu Yang, Chair of Steering Committee, IEEE BIBE and NIH); Distinguished Leadership and Visionary Award. Presented by FTRA (Future Technology Research Association), presented by Steering Committee of CSA-13 International Conference; Distinguished Research Award for his Outstanding Contributions to Adaptable Communication Systems, presented by ACM SIGAPP IMCOM Co-Chairs, 2014. Dr. Arabnia is an elected Fellow, International Society of Intelligent Biological Medicine (ISIBM); he has served on the Advisory Board of IEEE Technical Committee on Scalable Computing (TCSC, 2006-2012).

Professor Young-Sik Jeong is a professor in the Department of Multimedia Engineering at Dongguk University in Korea. His research interests include multimedia cloud computing, information security of cloud computing, mobile computing, IoT(Internet of Things), and wireless sensor network applications. He received his B.S. degree in Mathematics and his M.S. and Ph.D. degrees in Computer Science and Engineering from Korea University in Seoul, Korea in 1987, 1989, and 1993, respectively. He was a professor in the Department of Computer Engineering at Wonkwang University in Korea from 1993 to 2012. He worked and researched to Michigan State University and Wayne State University as visiting professor in 1997 and 2004 respectively. Since 2002, he has been serving as an IEC/TC 100 Korean Technical Committee member, as the IEC/TC 108 Chairman of Korean Technical Committee, and as an ISO/IEC JTC1 SC25 Korean Technical Committee member. Also He is an EiC(Editor-in-Chief) of Journal of Information Processing Systems, an associate editor of JoS(Journal of Supercomputing), IJCS(international Journal of Communication Systems) and an editor of JIT(Journal of Internet Technology), finally an associate editor of Journal of Human-centric Computing(HCIS) and so on. He is also is a member of the IEEE.

Professor James J. (Jong Hyuk) Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 100 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a president of the Future Technology Research Association International (FTRA) and Korea Information Technology Convergence Society (KITCS). He is editor-in-chief of Human-centric Computing and Information Sciences(HCIS) by Springer, International Journal of Information Technology, Communications and Convergence (IJITCC) by InderScience, and Journal of Convergence (JoC) by FTRA Publishing. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford Univ. press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, Human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Dr. Park' s research interests include Digital Forensics, Security, Ubiquitous and Pervasive Computing, Context Awareness, Multimedia Service, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, KICS, KIISC, KMMS, KDFS and KIIT.


This book presents the combined proceedings of the 7th International Conference onComputer Science and its Applications (CSA-15) and the International Conference onUbiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015.The aim of these two meetings was to promote discussion andinteraction among academics, researchers and professionals in the field ofcomputer science covering topics including mobile computing, security and trustmanagement, multimedia systems and devices, networks and communications,databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy.These proceedings reflect the state-of-the-art in the development of computationalmethods, numerical simulations, error anduncertainty analysis and novel applications of new processing techniques inengineering, science, and other disciplines related to computer science.

Professor Doo-Soon Park received his PhD in Computer Science from Korea University in 1988. Currently, he is a professor in the Department of Computer Software Engineering at Soonchunhyang University, South Korea. He is President of KIPS(Korea Information Processing Society) and Director of Central Library at Soonchunhyang University and Director of Wellness Service Coaching Center at Soonchunhyang University. He was editor in chief of JIPS(Journal of Information Processing Systems) at KIPS from 2009 to 2012. He was Dean of the Engineering College at Soonchunhyang University from 2002 to 2003, and was the Director of the u-Healthcare Research Center at Soonchunhyang University from 2006 to 2007. He has served as an organizing committee member of international conferences including CUTE 2014, CSA 2014, EMC-14, FutureTech 2014, and MUE 2014. His research interests include data mining, big data processing and parallel processing. He is a member of IEEE, ACM, KIPS, KMS, and KIISE. Contact him at parkds@sch.ac.kr. Professor Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. Arabnia is currently a Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, supercomputing, Big Data Analytics and applications in medical imaging, knowledge engineering, security and surveillance systems and other computational intensive problems. Most recently, he has been studying ways to promote legislation that would prevent cyber-stalking, cyber-harassment, and cyber-bullying. Dr. Arabnia is Editor-in-Chief of The Journal of Supercomputing (one of the oldest journals in Computer Science) published by Springer and has been Associate Editor of IEEE Transactions on Information Technology in Biomedicine (2008-2011). He is also on the editorial and advisory boards of 32 other journals. He is the book series editor-in-chief of “Transactions of Computational Science and Computational Intelligence” (Springer) and editor-in-chief of the book series entitled “Emerging Trends in Computer Science and Applied Computing" (Elsevier). Dr. Arabnia has received a number of awards; most recently (2007), he received an "Outstanding Achievement Award in Recognition of His Leadership and Outstanding Research Contributions to the Field of Supercomputing". This award was presented to him at Harvard University Medical School (signatories: Lawrence O. Hall, President of IEEE/SMC; Zhi-Pei Liang, Vice President of IEEE/EMB; Jack. Y. Yang, General Chair of IEEE BIBE and Harvard University; Mary Qu Yang, Chair of Steering Committee, IEEE BIBE and NIH); Distinguished Leadership and Visionary Award. Presented by FTRA (Future Technology Research Association), presented by Steering Committee of CSA-13 International Conference; Distinguished Research Award for his Outstanding Contributions to Adaptable Communication Systems, presented by ACM SIGAPP IMCOM Co-Chairs, 2014. Dr. Arabnia is an elected Fellow, International Society of Intelligent Biological Medicine (ISIBM); he has served on the Advisory Board of IEEE Technical Committee on Scalable Computing (TCSC, 2006-2012). Professor Young-Sik Jeong is a professor in the Department of Multimedia Engineering at Dongguk University in Korea. His research interests include multimedia cloud computing, information security of cloud computing, mobile computing, IoT(Internet of Things), and wireless sensor network applications. He received his B.S. degree in Mathematics and his M.S. and Ph.D. degrees in Computer Science and Engineering from Korea University in Seoul, Korea in 1987, 1989, and 1993, respectively. He was a professor in the Department of Computer Engineering at Wonkwang University in Korea from 1993 to 2012. He worked and researched to Michigan State University and Wayne State University as visiting professor in 1997 and 2004 respectively. Since 2002, he has been serving as an IEC/TC 100 Korean Technical Committee member, as the IEC/TC 108 Chairman of Korean Technical Committee, and as an ISO/IEC JTC1 SC25 Korean Technical Committee member. Also He is an EiC(Editor-in-Chief) of Journal of Information Processing Systems, an associate editor of JoS(Journal of Supercomputing), IJCS(international Journal of Communication Systems) and an editor of JIT(Journal of Internet Technology), finally an associate editor of Journal of Human-centric Computing(HCIS) and so on. He is also is a member of the IEEE. Professor James J. (Jong Hyuk) Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 100 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a president of the Future Technology Research Association International (FTRA) and Korea Information Technology Convergence Society (KITCS). He is editor-in-chief of Human-centric Computing and Information Sciences(HCIS) by Springer, International Journal of Information Technology, Communications and Convergence (IJITCC) by InderScience, and Journal of Convergence (JoC) by FTRA Publishing. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford Univ. press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, Human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Dr. Park' s research interests include Digital Forensics, Security, Ubiquitous and Pervasive Computing, Context Awareness, Multimedia Service, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, KICS, KIISC, KMMS, KDFS and KIIT.

Message from the CSA 2015 General Chair 6
Message from the CSA 2015 Program Chairs 8
Organization 10
Message from the CUTE 2015 General Chairs 14
Message from the CUTE 2015 Program Chairs 16
Organization 18
Contents 21
Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem 32
1 Introduction 33
2 Review in Lu et al.’s Scheme 33
2.1 Registration Phase 34
2.2 Login and Authentication 34
2.3 Password Change 35
3 Security Flaws in Lu et al.’s Scheme 35
3.1 Outsider Attack 35
3.2 User Impersonation Attack 35
3.3 Server Impersonation Attack 36
3.4 Smart Card Stolen Attack 36
4 Conclusion 37
References 37
Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks 38
1 Introduction 38
2 Review of Chen et al.’s Authentication Scheme 39
3 Cryptanalysis of Chen et al.’s Authentication Scheme 41
3.1 No Perfect Forward Secrecy 41
3.2 Session Key Exposure by GW node 42
3.3 Lack of Anonymity 42
3.4 Lack of Password Check 43
4 Conclusion 44
References 44
Proving Sufficient Completeness of Constructor-Based Algebraic Specifications 45
1 Introduction 45
2 Preliminaries 46
3 A Sufficient Condition of Sufficient Completeness 48
4 Proving Sufficient Completeness by Term Rewriting 49
5 Conclusion 50
References 51
Effect of Zooming Speed and Pattern on Using IPTV by Zoomable User Interface 52
1 Introduction 52
2 Background 53
2.1 Zooming Speed 53
2.2 Zooming Pattern 53
2.3 Speed and Patterns 54
3 Method 55
4 Results 57
4.1 Results of the 1st Experiment 57
4.2 Comprehensive Analysis of the Speed and the Pattern 57
5 Conclusions 57
References 58
Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm 59
1 Introduction 59
2 Related Work 61
3 The Overall of Framework 61
3.1 Function-Call Graph 61
3.2 Similarity Flooding Algorithm 62
4 Performance Analysis 64
5 Summary and Future Work 64
References 65
The Effect of Information Quality on User Loyalty Towards Smartphone Applications 66
1 Introduction 67
2 Research Methodology, Data Analysis, and Results 68
3 Discussion and d Conclusion 70
References 70
Appendix 71
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables 72
1 Introduction 72
2 Review of Lee’s Scheme 73
2.1 Registration Phase 74
2.2 Authentication Phase 74
2.3 Password Change Phase 75
3 Cryptanalysis of Lee’s Scheme 75
3.1 Failure to Preserve User Anonymity 76
3.2 Off-line Password Guessing Attack 76
3.3 User Impersonation Attack 76
4 Conclusions 77
References 77
The Effects of Information Quality on Mental Model and Interactivity in a Smartphone Context 79
1 Introduction 79
2 Research Methodology, Data Analysis, and Results 81
3 Discussion and d Conclusion 83
References 84
Appendix 84
Immersive Dissection Simulator Using Multiple Volume Rendering 85
1 Introduction 85
2 Immersive Virtual Dissection System 86
3 Experimental Result 88
4 Conclusion 89
References 90
Business Informatics Management Model 91
1 Introduction 91
2 Research Method 92
3 Business Informatics Management Model 92
3.1 Problem Identification and Motivation 92
3.2 Solution Objectives 93
3.3 MBI Model Design and Development 93
3.4 Demonstration , Evaluation and Communication 94
4 Conclusion 96
References 97
Group Awareness in Task Context-Aware E-mail Platform 98
1 Introduction 98
2 Related Work 99
3 Task Context-Aware E-mail Platform 100
3.1 System Overview 100
3.2 Task Context Model 101
3.3 E-mail Form Composition Service 101
3.4 Data Extraction Service 102
3.5 Group Awareness 102
4 Discussion 102
5 Conclusions and Future Works 103
References 103
An Android-Based Feed Behavior Monitoring System for Early Disease Detection in Livestock 104
1 Introduction 104
2 Related Works 105
3 Livestock Feed d Monitoring System 106
3.1 Workflow of th he Feed Monitoring System 107
4 Mobile Applica ation 107
5 Conclusion 108
References 109
Location-Aware WBAN Data Monitoring System Based on NoSQL 110
1 Introduction 110
2 Location-Aware WBAN Monitoring System 111
3 Experimental Results 114
4 Conclusions 115
References 115
Optimization of a Hybrid Renewable Energy System with HOMER 117
1 Introduction 117
2 Literature Review 118
3 Three Principal Tasks of HOMER 118
3.1 Simulation 118
3.2 Optimization 119
3.3 Sensitivity 119
4 Modeling System Components 119
4.1 Electrical Load Profile 119
4.2 PV Panel 119
4.3 Turbine 120
5 Hybrid System Development 120
6 Conclusion 122
References 123
Efficient Character Input Scheme Based on Gyro-Accelerometer Sensor for NUI 124
1 Introduction 124
2 Related Works 125
3 VGA Input Scheme 126
4 Design of VGA 127
5 Implementation of VGA 128
6 Conclusions 128
References 129
Ubiquitous Bluetooth Mobile Based Remote Controller for Home Entertainment Centre 131
1 Introduction 132
2 System Architecture 132
3 Android Motion Control Design and Implementation 135
4 Concluding Remark 136
References 137
Robust Feature Design for Object Detection 138
1 Introduction 138
2 Proposed Algorithm: Oriented Angular Keypoints 139
2.1 Preprocessing (Outline Detection) 140
2.2 Extract Principal Outline 140
2.3 Constitute Block Region 141
2.4 Computation of Angle and Direction 141
2.5 Object Matching 142
3 Experimental Results 142
4 Conclusion 143
References 144
An Efficient Key Management Scheme for Advanced Metering Infrastructure* 145
1 Introduction 145
2 Related Work 146
3 Identity-Based Hierarchical Key Management 147
3.1 Network Model 147
3.2 Key Establishment Overview 147
3.3 Key Generation 147
3.4 Key Management 147
4 Experimental R Results 148
5 Conclusion 149
References 149
Levenshtein Distance-Based Posture Comparison Method for Cardiopulmonary Resuscitation Education 151
1 Introduction 151
2 Posture Comparison Processes 152
3 Experiments 153
4 Conclusion 155
References 156
HMM Based Duration Control for Singing TTS 157
1 Introduction 157
2 HMM Based Singing TTS 158
3 Duration Control 159
3.1 Maximum Likelihood Based Duration Control Method 159
3.2 State Level Analysis Based Duration Control 160
3.3 Syllable Analysis Based Duration Control Method 161
4 Experimental Results and Conclusion 161
5 Conclusion 162
References 162
Data Analysis of Automated Monitoring System Based on Target Features 164
1 Introduction 164
2 System Scheme Design 165
3 Motion Detection System 166
4 Distance Calculation Using Ultrasonic Signal 167
5 Experiments and Performance Assessment 168
6 Conclusions 170
References 170
A Persistent Web Data Architecture with Named Data Networking 172
1 Introduction 172
2 System Design 173
2.1 Design Considerations 173
2.2 Architecture 174
3 Conclusion 177
References 177
Load Shedding for Window Queries Over Continuous Data Streams 178
1 Introduction 178
2 Preliminaries 179
2.1 Time-Based Windows 179
2.2 Disorder Control 180
3 Proposed Method 181
4 Conclusion and Future Work 183
References 183
Improved Location Estimation Method of Trilateration in Ubiquitous Computing Indoor Environment 184
1 Introduction 184
2 Trilateration-Based Beacon Location Estimation Method 185
3 Experiment 187
4 Conclusions 188
References 188
Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows 189
1 Introduction 189
2 Network Flows 190
3 Queries 190
4 Loading Time 191
5 Search Time 192
6 Conclusion 193
References 193
Group ID Issuing Model Using Temporal Explicit Movement in Social Life Logging 194
1 Introduction 195
2 Method 195
2.1 Experimental Method 195
2.2 Signal Analysis 196
2.3 Identifying Group 197
3 Result 198
4 Discussion 199
References 200
An Analysis of Infographic Design for Life-Logging Application 201
1 Introduction 201
2 Life-Logging 202
2.1 Concept and Features of Life-Logging 202
2.2 Life-Logging Information 202
3 Analysis of Life-Logging Applications 202
3.1 Method and Scope of Life-Logging Application Analysis 202
3.2 Results of Life-Logging Infographic Design Analysis 203
4 Conclusion 207
References 207
Cardiovascular Synchrony for Determining Significant Group in Social Life Logging 208
1 Introduction 208
2 Materials and Methods 209
2.1 Participants 209
2.2 Task Procedures and Experimental Task 209
2.3 Analysis Metho od 210
3 Result 211
4 Conclusion and Discussion 212
References 213
Correlation Between Heart Rate and Image Components 215
1 Introduction 215
2 Proposed Method 216
2.1 Heart Rate Measurement 216
2.2 Image Components 217
3 Experiments and Results 218
3.1 Configuration 218
3.2 Results 219
4 Conclusion 220
References 220
Experimental Verification of Gender Differences in Facial Movement According to Emotion 222
1 Introduction 222
2 Method of Facial Feature Extraction 224
3 Experimental Results 225
4 Conclusion 226
References 227
Heart Rate Synchronization with Spatial Frequency of Visual Stimuli 229
1 Introduction 229
2 Experimental Method 230
2.1 Visual Stimuli 230
2.2 Heart Rate Measurement 231
2.3 Experimental Procedure 232
3 Results 233
4 Conclusion 233
References 234
Effective Similarity Measurement for Key-Point Matching in Images 235
1 Introduction 235
2 Similarity Measures Between Images with Key-Points 236
2.1 Related Works 236
2.2 Proposed Simil larity Measure 237
3 Experiments a and Results 238
4 Conclusion 239
References 240
Vocabulary Modeling of Social Emotion Based on Social Life Logging 241
1 Introduction 241
2 Method 242
2.1 Sampling of Vocabularies 242
2.2 Analysis of Morpheme 243
3 Analysis 244
3.1 Frequency Analysis 244
3.2 Similarity Evaluation 244
3.3 Multi-dimensional Scaling 245
3.4 Card Sorting 245
4 Results 246
5 Discussion 248
References 248
LIDAR Simulation Method for Low-Cost Repetitive Validation 249
1 Introduction 249
2 Related Work 250
3 LIDAR Simulation System Structure 250
3.1 LIDAR Sensing Module 251
3.2 Binary File Generation Module 252
4 Experiment and Analysis 252
5 Conclusion 254
References 254
Posture Recognition Using Sensing Blocks 255
1 Introduction 255
2 Related Work 256
3 Posture Recognition 256
4 Recognition Ex xperiment 258
5 Conclusions 258
References 259
Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing 260
1 Introduction 260
2 VANET and Vehicular Cloud Architecture 261
2.1 VANET 261
2.2 Vehicular Cloud Architecture 261
3 Secure Protocol for Session Key Exchange 262
4 Security Analysis 264
4.1 Replay Attack 264
4.2 Eavesdropping and Brute Force Attack 264
4.3 Mutual Authentication 265
5 Conclusion 265
References 265
Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments 266
1 Introduction 266
2 Multi-cloud Computing 267
2.1 Multi-cloud 267
2.2 Cloud Type 267
3 Zero-Knowledge Authentication Protocol 268
4 Security Analysis 270
4.1 Replay Attack and Relay Attack 270
4.2 Anonymity and Eavesdropping 270
4.3 Forward Security and Error Detection 271
5 Conclusion 271
References 271
PUF-Based Privacy Protection Method in VANET Environment 273
1 Introduction 273
2 Vehicular Ad-hoc Network (VANET) 274
3 Physical Unclonable Functions(PUF) 275
4 Proposed Protocol 275
4.1 OBU Mutual Authentication Phase 275
4.2 OBU Handover r Phase 276
5 Security Evalu uation 277
5.1 g Eavesdropping Attacks 277
5.2 Masquerading Attacks 277
5.3 Replay Attacks 278
5.4 Vehicle Anonymity 278
6 Conclusion 278
References 278
Design of Authentication Protocol Based on Distance-Bounding and Zero-Knowledge for Anonymity in VANET 279
1 Introduction 279
2 VANET (Vehicular ad hoc networks) 280
2.1 VANET Overview 280
2.2 VANET Authentication Security Considerations 280
3 Zero-Knowledge Authentication 281
3.1 Zero-Knowledge Authentication Properties 281
4 Distance-Bounding Protocol 281
4.1 Distance-Bounding Overview 281
5 Proposal 281
5.1 Protocol Process 283
6 Security Analysis 283
6.1 Resistance to Relay Attack 283
6.2 Ensures Anonymity 283
6.3 Forward Security and Error Detection 284
7 Conclusion 284
References 284
Design of Exploitable Automatic Verification System for Secure Open Source Software 285
1 Introduction 285
2 Preliminaries 286
2.1 Open Source Software(OSS) 286
2.2 Web Crawling 286
2.3 Software Testing Methodologies 287
2.4 Information Related to Global Vulnerabilities 287
3 Design of Exploitable Automatic Verification System 288
3.1 Pre-Execution Procedure 288
3.2 Exploitable Verification Part 289
4 Conclusion 290
References 290
User Authentication Method Design Based on Biometrics in a Multi-cloud Environment 292
1 Introduction 292
2 Learning System 293
2.1 Multi Cloud 293
2.2 Biometric Authentication 293
3 Proposed Protocol 294
4 Security Analysis 296
4.1 Replay Attack 296
4.2 Brute Force Attack 296
4.3 Eavesdropping Attacks 296
5 Conclusion 297
References 297
A Study on Framework for Developing Secure IoT Service 298
1 Introduction 298
2 Related Works 298
3 Proposal for IoT Security Framework 299
3.1 IoT Security Principles 300
3.2 Protection for Key Value of Key Management and Authentication 301
4 Conclusions 302
References 302
Device Dedication in Virtualized Embedded Systems 304
1 Introduction 304
2 IO Virtualization in Embedded Systems 305
3 Implementatio on 306
4 Conclusion 307
References 308
An Estimation Filtering for Packet Loss Probability Using Finite Memory Structure Strategy 309
1 Introduction 309
2 PLP Estimation Filter with Finite Memory Structure Strategy 310
3 Computer Simulations 313
4 Concluding Remarks 314
References 315
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices 316
1 Introduction 316
2 Review in Djellali et al.’s Scheme 317
2.1 Setup Phase 317
2.2 Registration Phase 318
2.3 Login and Authentication Phase 318
2.4 Password Change Phase 319
3 Security Analysis of Djellali’s Scheme 319
3.1 Insider Attack 319
3.2 Smart Card Stolen and Offline-Password Guessing Attack 319
3.3 Impersonation Attack 320
3.4 Replay Attack 320
4 Conclusion 321
References 321
Feasibility and Reliability of a Mobile Application for Assessing Unilateral Neglect 323
1 Introduction 323
2 Methods 324
2.1 The Proposed Digital Testing Methods 325
3 Results 327
4 Conclusion 328
References 328
A Context-Aware Framework for Mobile Computing Environment 330
1 Introduction 331
2 Related Works 331
3 Design of Framework for Context Aware System 332
4 Applying the Framework for Monitoring System 333
5 Conclusion 335
References 335
The Design of Log Analysis Mechanism in SDN Quarantined Network System 336
1 Introduction 336
2 Security Threats Detectable Through Log Analysis 338
3 Features of NoSQL and Map-Reduce Technology 338
4 Log Analysis Mechanism 339
5 Conclusion 340
References 341
A Study on the Defense MITM with Message Authentication in WLAN Environments 342
1 Introduction 342
2 MITM Attack Scenario 343
2.1 Environment C Construction 343
2.2 Attack Process 344
2.3 Riskiness Analy lysis of Application 344
3 Foundation Te echnique 345
3.1 Message Authe entication Code 345
3.2 Security Comm munication Model Based on MAC 346
4 Proposed Mod del 346
5 Evaluation on the Proposed Model 347
6 Conclusion 348
References 349
Interactive Activity Recognition Using Articulated-Pose Features on Spatio-Temporal Relation 350
1 Introduction 350
2 Methodology 352
2.1 Joint Detection 352
2.2 Feature Extraction 352
3 Experiment 354
4 Conclusion 355
References 356
Development of Learner-Centric Teaching-Learning Application Model for Ubiquitous Learning 357
1 Introduction 357
2 Theoretical Background 358
2.1 Ubiquitous Learning 358
2.2 App Inventor 359
3 Development of Learner-Centric Teaching-Learning Application Based on Ubiquitous Learning 360
4 Application to Education Field 361
4.1 Study Method and Research Tool 361
4.2 Study Findings 362
5 Conclusion 362
References 363
EAP: Energy-Awareness Predictor in Multicore CPU 364
1 Introduction 364
2 Proposed Method 365
2.1 Target Process 365
2.2 Prediction Model 366
3 Performance Evaluation 367
3.1 Experiments 367
3.2 Results 368
4 Conclusion 368
References 369
Design and Implementation of LMS for Sharing Learning Resources in e-Learning 370
1 Introduction 370
2 Design and Implementation 371
3 Suitability Review 374
4 Conclusion and Suggestions 375
References 375
A Zero-Watermarking Scheme Based on Spread Spectrum and Holography 377
1 Introduction 377
2 Related Work 378
2.1 Spread Spectrum 378
2.2 Holography 379
2.3 Visual Cryptography 379
3 Zero Watermark Scheme 380
3.1 Zero Watermark Embedding 380
3.2 Zero Watermar rk Extraction 381
4 Experimental Re esults and Analysis 381
5 Conclusions 383
References 383
A Novel Seamless Redundancy Protocol for Ethernet 384
1 Introduction 384
2 The Proposed RPE 385
2.1 RPE Concepts 385
2.2 RPE Frame Structure 386
2.3 RPE Operations 387
3 Redundancy Performance 388
4 Simulations 389
5 Conclusion 390
References 390
Mutual Authentication Scheme Based on GSM for NFC Mobile Payment Environments 391
1 Introduction 391
2 Related Work 392
3 Security Requirements 392
4 Proposed Scheme 393
4.1 System Parameters 393
4.2 Mutual Authentication Phase (Key Agreement) 393
5 Conclusion 394
References 395
Necessity of Incentive System for the First Uploader in Client-Side Deduplication 396
1 Introduction 396
2 Brief Review of Client-Side Deduplication 397
3 Disadvantage for the First Uploader in Client-Side Dedup 398
3.1 Privacy Leakage 399
3.2 Expensive Service for Devoted Behavior 399
4 Incentive System in Client-Side Deduplication 400
5 Conclusion 400
References 401
Design and Implementation of Disaster Information Alert System Using Python in Ubiquitous Environment 402
1 Introduction* 402
2 Research of Disaster Based Ubiquitous 403
3 Disaster Information Alert System 405
3.1 Implementation n of DI Alert System 406
4 Conclusions 407
References 408
A Study on the Development of Real-Time Analysis Monitoring System and Its Application of Medical Ins 409
1 Introduction 409
2 Related Research 410
2.1 Hadoop 410
2.2 Complex Event Processing 410
2.3 Hadoop and EP CE for Big Data Approach 411
3 System Compo ositions and Implementation 411
4 Conclusion 414
References 414
Green Treatment Plan Selection Based on Three Dimensional Fuzzy Evaluation Model 415
1 Introduction 415
2 Three Dimensional Evaluation Model 416
3 Green Medical Treatment Plan Selection Strategy Based on Three Dimension Fuzzy Evaluation Model 417
3.1 Establishing the Membership Functions 417
3.2 Degree of Membership Aggregation 418
3.3 Ranking the Treatment Plans 419
4 An Illustrative Example 419
5 Conclusions 420
References 420
Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure 422
1 Introduction 422
2 Format-Preserving Encryption with Feistel Structure 423
3 Implementation of Unbalanced-Feistel FPE 424
3.1 FFX[radix] with Unbalanced-Feistel Structure 424
3.2 VAES3 and BPS with Unbalanced-Feistel Structure 425
4 Performance Analysis 426
5 Conclusion 426
References 427
Energy Consumption Reduction Technique on Smart Devices for Communication-Intensive Applications 428
1 Introduction 428
2 Related and Previous Works 429
3 An Energy Consumption Reduction Technique 430
4 Conclusions 431
References 432
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services 433
1 Introduction 433
2 Related Studies 434
3 Framework for Service Accountability Between Cloud Services 435
3.1 Data Accountability vs. Service Accountability 435
3.2 Framework of the Service Accountability for the Cloud 435
3.3 Representational Scheme of Service Accountability Policy 436
4 Comparison 438
5 Conclusion 438
References 439
A New Visual Pet Activities Monitoring System Design 440
1 Introduction 440
2 System Design 441
2.1 Motion Detection 441
2.2 Object Recognition 441
3 System Structure 443
4 Conclusion 445
References 445
A Study of Security Level in Cloud Computing 446
1 An Overview on Cloud Computing 446
2 Literature Survey 447
3 Some of Security Metrics of Cloud Computing 447
4 Security Issues and Solutions 448
4.1 Security Challenges 448
4.2 Some Solutions on Security Issues 449
4.3 Security Level Analysis 450
5 Conclusion and Future Work 451
References 451
The Dynamic Unequal Clustering Routing Protocol Based on Efficiency Energy in Wireless Sensor Network 452
1 Introduction 453
2 Related Works 453
3 The System Model and Assumption 453
3.1 The System Model 453
3.2 The Energy Model 454
4 Dynamic Unequal Clustering Routing Protocol Based on Efficiency Energy in Wireless Sensor Network 455
4.1 Set-up Phase 455
4.2 Steady-Set Phase 455
4.3 Reconstruction Phase 455
5 Analysis and Simulation Result 456
6 Conclusion 458
References 458
A Study on the Localization Algorithm Using RSSI and Directional Antennas Between Sensor Nodes for the DV-HOP Algorithm 459

2 Localization Algorithm Model 460
3 Simulation and Analysis 461
4 Conclusion 463
References 464
Estimation of Human Social Relation Based on Device Connectivity 465

2 Related Works 466
3 Human Sociality Based on Device Connectivity 467
4 Experimental Results R 468
5 Conclusion 469
References 470
Secure Framework for Software Defined Based Internet of Things 471

2 Software-Defined Internet of Things 472
3 SDIoT Secure Framework Requirements 473
4 SDIoT Secure Frameworks 474
4.1 Infrastructure 474
4.2 Control Layer 474
4.3 Application Layer 475
5 Conclusion 476
References 476
Secure Data Access Control Scheme for Smart Home 477

2 Analysis of Security Requirements 478
2.1 Data Confidentiality 478
2.2 Device Authentication 478
2.3 Access Control 478
3 Proposed Scheme 479
3.1 Proposed Scheme Component 479
3.2 Data Access Control 480
4 Security Analysis of the Proposed Scheme 481
4.1 Data Confidentiality 481
4.2 Authentication 481
4.3 Access Control 482
5 Conclusion 482
References 482
A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems 483
1 Introduction 483
2 Related Work 484
2.1 PSO and Correlation-Based Feature Selection 484
2.2 Fusion of Tree-Based Classifiers 485
3 Experimental Setup 485
4 Result and Discussion 487
5 Conclusion 488
References 488
Secure Traffic Data Transmission Protocol for Vehicular Cloud 490
1 Introduction 490
2 System Architecture 491
3 Protocol Description 492
4 Security Analysis and Performance 494
5 Conclusion 495
References 495
A Short-Range Tracking System Based on Bluetooth Radio Identification: An Algorithm and Its Implementation 497
1 Introduction 497
2 The Proposed Approach 498
3 Implementatio on 499
3.1 BT Transmitter 499
3.2 BT Receiver 500
4 Detection Analyses 501
5 Conclusions 503
References 504
Design and Implementation of a Collaboration Messenger System Based on MQTT Protocol 505
1 Introduction 505
2 Related Research 506
2.1 Message Transmission Protocol 506
2.2 MQTT Protocol 506
3 Design of MQTT Based Collaboration Messenger 507
3.1 Reliable Messages Delivery Technique 507
3.2 Design of MQTT Based Collaboration Messenger Protocol 508
3.3 Collaboration Messenger System Configuration 509
4 Experiment 510
4.1 Experiment Environment 510
4.2 Result of Experiment 510
5 Conclusion 510
References 511
Financial Security Protocol and Service Model for Joint Account Banking Transaction 512
1 Introduction 512
2 Study on the Diffie–Hellman and Station-to-Station Protocols 513
2.1 Diffie–Hellman Protocol and the Features 513
2.2 Station-to-Station Protocol 514
3 Financial Security Protocol Design for Joint Accounts 514
3.1 The Proposing Security Protocol 514
3.2 Safety Verification of Financial Security Protocol 515
4 The Financial Security Service Model of Joint Account 516
5 Conclusion 517
References 518
Development of a Cursor for Persons with Low Vision 519

2 Design of a Cursor for Persons with Low Vision 520
2.1 Basic Functions 521
2.2 Advanced Functions 521
3 Performance Evaluation 522
3.1 Experimental Design 522
3.2 Experimental Result 522
4 Conclusion 524
References 524
Implementation of Unified Gesture Library for Multiple-Devices Environments 525
1 Introduction 526
2 Related Works 527
3 UGesture Platform 527
4 Applications Using the UGesture Platform 528
5 Conclusion 530
References 530
Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart Working* 531
1 Introduction 532
2 Related Research 533
2.1 Push System 533
3 Design of the Real-time Mobile Push System for Satellite Communication to Implement Smart Work on the Ship 534
4 Conclusion and Future Work 536
References 537
A Shipboard Secret Ballot System for the ICT-Isolated Ocean Crews 539

2 Related Research 540
2.1 Data Flow Diagram of the On-board Secret Ballot System 540
2.2 VMS / e-NOAD 541
2.3 e-NOA/D (Electronic Notification of Arrival / Departure) System 541
3 Shipboard Secret Ballot Algorithm 541
3.1 1st Step: Confirmation of On-Board Crews Eligible for the Ballot (D-30 days) 542
3.2 2nd Step: Installation And tests of the Voting Machines (D-15 days) 542
3.3 3rd Step: Updating the Ballot-Eligible Crew List (2nd) (D-7 days) 543
3.4 4th Step: Commencement of the Ballot (D-day) 543
3.5 5th Step: Vote Counting Method 543
3.6 6th Step: Transmitting the Vote Count Results (ship’s DID) 544
4 Shipboard Secret Ballot System 544
5 Conclusion 546
References 546
Secure Deletion for Flash-Based Self-Encrypting Drives 548
1 Introduction 548
2 Background 549
2.1 Self-Encrypting Drive 549
2.2 Phase-Change Memory 550
3 Secure Deletion for Self-Encrypting Flash Memory 550
4 Performance 553
5 Conclusion 554
References 555
A Distributed Mobility Support in SDN-Based LTE/EPC Architecture 556
1 Introduction 556
2 SDN-Based Distributed Mobility Support 558
2.1 SDN-Based DMM Architecture 558
2.2 SDN-Based DMM (SDMM) 559
3 Performance Evaluation 560
4 Conclusions 562
References 562
Implementation of Wireless Communication- Based Video Control System for Media Façade 563
1 Introduction 563
2 Backgrounds 564
2.1 Technology of Realizing Media Façade 564
2.2 Multi Image Display 565
3 Wireless Video Control System that Uses RF Communication 566
3.1 RF Communication 566
3.2 Wireless Video Control System 566
4 Conclusion 568
References 569
Adaptive Clustering of Merchandise Code for Recommender System with an Immediate Effect 570
1 Introduction 570
2 Related Works 571
2.1 RFM Model 571
2.2 Clustering 572
2.3 BN(Bayesian Network) 573
3 Our Proposal for a Recommender System with an Immediate Effect 574
3.1 Adaptive Clustering of Merchandise Code 574
4 The Environment of Implementation and Experiment and Evaluation 576
4.1 Experimental Data for Evaluation 576
4.2 Experiment and Evaluation 577
5 Conclusions 578
References 579
Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing Environments 580
1 Introduction 580
2 Motion Estimation Processes 581
3 Experiment 582
4 Conclusion 585
References 585
Occlusion Detection Using Multi-mode Mean-shift Tracking 586
1 Introduction 586
2 Mean-shift Tracking Using Multi-mode Kernel 588
2.1 Partitioning the Target Region 588
2.2 Target Model Using Multi-mode Global Kernel Weight 588
2.3 Target Candidate Using Multi-mode Global Kernel Weight 589
2.4 Mean-shift Tracking 589
3 Occlusion Detection Using Coefficient Variation of Bhattachryya Coefficient 590
4 Experimental Results 590
4.1 Tracking Errors 591
4.2 Occlusion Detection Results 592
5 Conclusions 592
References 593
OCSP Modification for Supporting Anonymity and High-Speed Processing in Vehicle Communication System 594
1 Introduction 594
2 Traditional Message Transmission Method Using Certificate 595
2.1 Message Format 595
2.2 Operations 596
3 Message Transmission Method Using Proposed OCSP Response 596
3.1 Proposed OCSP Response Format 597
3.2 Message Format 597
3.3 Operations 598
4 Conclusions 599
References 599
A Study on the New Ethernet Communication Method Using Virtual MAC Address 600
1 Introduction 600
2 Designs 601
2.1 Frame Format 601
2.2 VARP 602
3 Operations 603
4 Conclusions 605
References 605
A Hybrid Prediction Model Integrating FCM Clustering Algorithm with Supervised Learning 606
1 Introduction 606
2 Related Work 607
2.1 FCM (Fuzzy C-Means) Clustering Algorithm 607
2.2 Numerical Prediction Using the FCM Clustering Algorithm 608
3 Design of A Hybrid Prediction Model 609
3.1 Process of the Proposed Prediction Model 609
3.2 Algorithm of the Proposed Model and its Verification 610
4 Implementation and Evaluation 611
4.1 Results Predicted by Using Back-Propagation Algorithm 612
4.2 Hybrid Fuzzy C C-Means (FCM) Clustering 613
4.3 Analysis of the Function of the Proposed Model 615
5 Conclusion 615
References 616
Environmental Monitoring Over Wide Area in Internet of Things 617
1 Introduction 617
2 EMoMC 618
2.1 Components in System 618
2.2 Local Storage Management Algorithm 619
2.3 MC 620
2.3 MC´s Data Collecting Algorithm 620
3 Simulation Works 621
3.1 Local Storage Management Algorithm 621
4 Conclusion 622
References 622
Speech-to-Text-Based Life Log System for Smartphones 623
1 Introduction 623
2 Proposed System Overview 624
3 Experimental Results 626
4 Conclusion and Future Works 628
References 628
The Packet Filtering Method with Packet Delay Distribution Forecasting for Stability and Synchronization in a Heterogeneous Network 629
1 Introduction 629
2 Applications of Packet Filtering Method 631
2.1 Packet Filtering Method(PFM) 631
2.2 Numerical Sim mulation 632
3 Conclusion 634
References 634
An Automatic Feedback System Based on Confidence Deviations of Prediction and Detection Models for English Phrase Break 635
1 Introduction 635
2 Material 636
2.1 A Corpus for Phrase Break Models 636
2.2 Preprocessing the BU Corpus 636
3 Methods 637
3.1 Prediction Mod del 637
3.2 Detection Model 638
3.3 Feedback Provision 638
4 Results 639
4.1 Validation of the Prediction and Detection Models 639
4.2 Validation of the Feedback Provision Model 640
5 Conclusion 640
References 640
Conceptual Design of a Network-Based Personalized Research Environment 642
1 Introduction 642
2 Related Works 643
2.1 Research Support Environments 643
2.2 Changes in Information Service Environment 644
3 Design of a Personalized Research Environment 645
4 Conclusion 647
References 647
Design and Implementation of the Basic Technology for Realtime Smart Metering System Using Power Line Communication for Smart Grid 648
1 Introduction 649
2 Related Research 649
2.1 PLC between Electronic Ammeter and Main Server 649
2.2 Connection System Diagram 650
3 Basic Technology for Realtime Smart Metering System 650
3.1 Relationship Diagram of the Power System Control Programs Using PLC 650
3.2 RS232-Based Protocol Design 652
4 Conclusion 652
References 653
Parallel Balanced Team Formation Clustering Based on MapReduce 655
1 Introduction 656
2 Parallel Balanced Team Formation Algorithm 656
2.1 Balanced Team Formation Algorithm 656
2.2 Parallel Balanced Team Formation Algorithm 657
3 Conclusion 659
References 659
2D Barcode Localization Using Multiple Features Mixture Model 660
1 Introduction 660
2 2D Barcode Detection System in Our Approach 661
2.1 2D Barcode Localization 662
2.2 Corner Features for 2D Barcode Localization 662
2.3 Variance-Frequency Distribution Model 662
2.4 Estimation of Final QR Code Region 663
3 Experiments 663
4 Conclusions 664
References 665
LPLB: A Novel Approach for Loop Prevention and Load Balancing in Ethernet Ring Networks 666
1 Introduction 666
2 LPLB Approach 667
2.1 LPLB Concept and Setup Procedure 667
2.2 Monitoring and Recovery Procedure 670
3 LPLB Performa ance Analysis 672
4 Conclusions 674
References 674
Design & Implementation for Emergency Broadcasting Using Agencies’ Disaster Information

2 Disaster Broadcasting in Korea 676
3 Disaster Information Contents Analysis 677
4 Implementatio on of Disaster Situation Dashboard 678
5 Conclusion 679
References 679
Application and Development of Service Integration Platform for Agricultural Products 680
1 Introduction 680
2 Agricultural Product’s ICT Convergence 681
2.1 ICT Convergence Strategy for Agricultural Products 681
2.2 Agricultural Products ICT Convergence Ecosystem 681
3 Agricultural Products Mobile Service Integration Platform 682
3.1 Mobile Service Integration Platform 682
3.2 Mobile Service Integration Platform Connection 683
4 Conclusion 684
References 684
Implementation of Kegel Exercises for Prevention of Urinary Incontinence and Treatment Thereof 685
1 Introduction 685
2 Relevant Studies 686
2.1 Insertable Exercise Equipment 686
2.2 Extracorporeal l Exercise Equipment 687
3 System Design and Main Functions 688
3.1 Structure of Pressure Sensors and Arduino Board System 688
3.2 Structure of Communication System 688
3.3 Construction of a Combined Server 689
3.4 Diagram of Program 690
4 Conclusion 690
References 691
A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT Networks 692
1 Background 692
2 Proposed Attestation Scheme 694
2.1 Neighbor Discovery and Verifier Election 694
2.2 Path Establishment and Function Assessment 695
2.3 Path Integration and Consistency Analysis 696
3 Analysis and Discussion 697
4 Performance Evaluation 698
5 Conclusion and Future Work 699
References 700
Multiple Service Robot Synchronization and Control with Surveillance System Assistance for Confined Indoor Area Applications 701
1 Introduction 702
2 Navigation and Synchronization Strategy 703
2.1 Grid Based Concurrent Navigation 703
2.2 Extension to Multi-Cell Environments 704
2.3 Role of Surveillance Network 704
3 Environment Adaptations 705
3.1 Dynamic Obstacle Management 705
3.2 Virtual Grid Adaptation for Fine Grain Navigation 705
3.3 Speed Control with Node-Ordering 706
4 Evaluations 706
5 Conclusions 708
References 708
Author Identification and Analysis for Papers, Reports and Patents 709
1 Introduction 709
2 Author Control Strategy 711
3 Analysis of Author Identification Results 711
4 Conclusions and Future Research 712
References 713
Resource-Aware Job Scheduling and Management System for Semiconductor Application 714
1 Introduction 714
1.1 Job Scheduling 716
1.2 Resource Management 716
2 Resource-Awa are Scheduling System 717
3 Dynamic Reso urce Management 719
4 Result 720
5 Conclusion 721
References 721
Live Mobile Learning System with Enhanced User Interaction 722
1 Introduction 722
2 Live Mobile Learning System with Enhanced user Interaction 723
3 Conclusion 726
References 727
Implementation of Autonomous Navigation Using a Mobile Robot Indoor 728
1 Introduction 728
2 Element Technology for Navigation 729
2.1 Map Building 729
2.2 Localization 729
2.3 Path Planning and Obstacle Avoidance 730
2.4 Integration of the Algorithm Components 731
3 Experiments 732
4 Conclusion 733
References 733
Convergence Modeling of Heterogeneous Medical Information for Acute Myocardial Infarction 734
1 Introduction 734
2 Analysis of AMI-related Data 735
3 Data Convergence Modeling for AMI 736
4 Conclusion 739
References 740
HiL Test Based Fault Localization Method Using Memory Update Frequency 741
1 Introduction 741
2 Related Work 743
3 Finding the Fault Candidates Using Memory Update Frequency 744
3.1 Problem Definition 744
3.2 Fault Localization Process 744
4 Experimental Result 747
5 Conclusion 748
References 748
Data Cascading Method for the Large Automotive Data Acquisition Beyond the CAN Bandwidth in HiL Testing 749
1 Introduction 749
2 Related Work 751
3 Data Cascading Method 751
3.1 Slicing Data into Segments 752
3.2 Defining Message Protocol by Reusing CAN Data Field 753
3.3 Data Cascading Algorithm 753
4 Experimental Result 754
4.1 Experiments 754
4.2 Evaluation 755
5 Conclusion 755
References 756
Classification Framework for Electropulsegraph Waves 757
1 Introduction 757
2 Classifications of Electropulsegraphy Waves Based on Logistic Regression 758
2.1 Regularized Logistic Regression 758
2.2 One-vs-all Mul lticlass Classification 759
3 Estimation Res sults 759
4 Conclusions 762
References 763
Optimization of LSPL Algorithm for Data Transfer in Sensor Networks Based on LEACH 764
1 Introduction 764
2 Relevant Studies 765
2.1 LEACH Protocol 765
2.2 LSPL Algorithm 765
3 Optimization of LSPL Algorithm 766
4 Simulation and Analysis 767
4.1 Experimental Environment 767
4.2 Evaluation of L LSPL Algorithm Performance 768
5 Conclusion 770
References 770
In-Memory Processing for Nearest User-Specified Group Search 772
1 Introduction 772
2 Problem Formulation 773
3 In-Memory NUG Query Processing 774
4 Experimental Results 776
5 Conclusion 777
References 778
Choreography Retrieval from the Korean POP Dance Motion Capture Database with Low-Cost Depth Cameras 779
1 Introduction 779
2 Choreography Retrieval System 780
3 Experimental Results 783
4 Conclusion and Future Work 784
References 784
Enhancing PIN Input for Preventing Eavesdropping in BLE Legacy Pairing 786
1 Introduction 786
2 Bluetooth 787
2.1 Architecture 787
2.2 Security s Issues 788
3 Increasing Bluetooth PIN’s Entropy 789
4 Computational Entropy Comparison 789
5 Conclusion 790
References 790
Erasure Codes Encoding Performance Enhancing Techniques Using GPGPU Based Non-sparse Coding Vector in Storage Systems 791
1 Introduction 791
2 Erasure Codes 792
3 GPU Based Erasure Codes Encoding Using Non-sparse Coding Matrix 793
4 Experimental Results 794
5 Conclusion 795
References 796
FAIR-Based Loss Measurement Model for Enterprise Personal Information Breach 797
1 Introduction 797
2 Previous Research 798
2.1 South Korea 798
2.2 The World 798
2.3 FAIR (Factor Analysis of Information Risk) Methodology 799
3 Loss Measurement Model 800
3.1 Limitations of Previous Research and Contribution of the Current Research 800
3.2 Probability Interval Model for Enterprise Environment 801
3.3 Loss Measurement Model Where Timing Issue Is Considered 802
3.4 Improved FAIR Methodology Process 802
4 Conclusion 803
4.1 Case Study and Application of the Proposed Model 803
4.2 Conclusion 804
References 804
Variational Bayesian Inference for Multinomial Dirichlet Gaussian Process Classification Model 806
1 Introduction 806
2 Multinomial Dirichlet Gaussian Process Classification Model 807
3 Variantial Bay yesian Inference 808
3.1 Variational App proximate Posterior Distribution 808
3.2 Predictive Classification Method for New Sample 810
4 Experimental Results 811
5 Conclusion 812
References 812
A Log Regression Seasonality Based Approach for Time Series Decomposition Prediction in System Resources 814
1 Introduction 814
2 Related Work 815
2.1 Time Series Decomposition 815
2.2 Seasonality 816
3 Detecting Trend and Seasonality, Forecasting 816
3.1 Detecting Trend and Seasonality 816
3.2 Log Regression Seasonality 816
4 Experiment 817
4.1 The Prediction Accuracy: TSD vs. LRTSD vs. Simple Linear Regression TSD (SLRTSD) 818
5 Conclusions 819
References 819
A Study on the Algorithm Design for Improving the Accuracy of Decision Tree 821
1 Introduction 821
2 Related Study 822
2.1 Decision Tree 822
2.2 IoT Data Processing 822
3 Improved Decision Tree 823
3.1 Algorithm Process 824
3.2 Error Correction 824
3.3 Processing of the Limit Value 825
4 Test and Evaluation 825
4.1 Experimental Results and Analysis 826
5 Conclusions and Future Challenges 828
References 828
Design of a Smartphone-Based Driving Habit Monitoring System 830
1 Introduction 830
2 Related Work 831
2.1 OBD-II 831
2.2 Wearable Devices 832
2.3 Driver Monitoring System 832
3 System Design 832
3.1 System Architecture 832
3.2 Monitoring Service 833
4 Conclusion 834
References 834
Analysis of Medical Data Using the Big Data and R 836
1 Introduction 836
2 ECG-ViEW Database 837
2.1 Overall Structure of Tables 837
2.2 Explanation of Table 838
3 ECG-ViEW Data Analysis 838
3.1 Association Analysis with ECG-ViEW Database 838
3.2 Outlier Diagnosis of ECG-ViEW Data 839
3.3 Simple Regression Analysis of ECG-ViEW Data 840
4 Conclusion 841
References 842
Homography-Based Motion Detection in Screen Content 843
1 Introduction 843
2 The Characteristic of Motion in Screen Contents 845
3 Motion Detection 845
3.1 The Proposed Screen Content Scheme 845
3.2 Motion Detection 846
4 Experimental results 848
5 Conclusions 848
References 849
A Reference Architecture Framework for Orchestration of Participants Systems in IT Ecosystems 850
1 Introduction 850
2 Meta-model for IT Ecosystem 851
3 Architecture of IT Ecosystems for Orchestration 852
4 Conclusion 856
References 856
Contents Based Traceability Between Research Artifact and Process for R& D Projects
1 Introduction 857
Traceability in the General Software Industry 858
3 Content Based Traceability Between Research Artifact and Process for R& D Projects
3.1 Research Descriptor Traceability 859
3.2 Research Descriptor Based Traceability Information Model 859
3.3 Definition of Relation Type for Research Descriptor 860
3.4 Example of Research Descriptor Based Traceability 862
4 Conclusion and Further Works 863
References 864
Design and Implementation of Panoramic Vision System Based on MPEG-V 865
1 Introduction 865
2 Usage Scenarios 866
2.1 Virtual Panoramic IVI (In-Vehicle Information System) 866
2.2 Virtual Panora amic Black Box 867
3 Extension of M MPEG-V Metadata Schema for Panoramic Vision 867
3.1 RADAR Sensor r Type 867
3.2 Array Camera Sensor Type 868
4 Implementatio on of Panoramic Vision and Metadata Generation 869
5 Conculusion 870
References 870
Computational Fluid Dynamics Analysis of the Air Damping for an Electromechanical Converter 872
1 Introduction 872
2 Numerical Simulation 873
3 Results and Discussion 875
4 Conclusions 878
References 879
Author Index 880

Erscheint lt. Verlag 17.12.2015
Reihe/Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Zusatzinfo XXXI, 918 p. 415 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Artificial Intelligence • database and data mining • Dependable, Reliable and Autonomic Computing • Distributed and Parallel Algorithms • Embedded System and Software • Game and Software Engineering • Grid and Scalable Computing • IT Policy and Business Management • Mobile and ubiquitous computing • Multimedia Systems and Services • Networking and communications • Security and Trust Management • Web and Internet Computing
ISBN-10 981-10-0281-9 / 9811002819
ISBN-13 978-981-10-0281-6 / 9789811002816
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 53,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
24,99