Skip to main content

2012 | Buch

Computer Science and its Applications

CSA 2012

herausgegeben von: Sang-Soo Yeo, Yi Pan, Yang Sun Lee, Hang Bae Chang

Verlag: Springer Netherlands

Buchreihe : Lecture Notes in Electrical Engineering

insite
SUCHEN

Über dieses Buch

The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA.

In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).

Inhaltsverzeichnis

Frontmatter

Computer Science and its Applications

Frontmatter
Utilizing TPM Functionalities on Remote Server

Trusted Platform Module (TPM) has become an essential functionality in the information security world today. However, there are legacy computers that do not have TPM onboard and would still want to use the TPM functionalities without having to replace the hardware. Also, TPMs are not available for virtual machines hence there is a need to provide integrity of the virtual machine platforms. This paper introduces a framework to provide a remote server with TPM capabilities for the legacy computer and also virtual machines to be able to utilize TPM functionalities. In this framework, there is also a need to provide fault tolerance mechanism to ensure reliability of the server and also scalability feature is incorporated to cater for growing number of users. The main component of the framework is the ‘vTPM Manager’ module which resides in the remote TPM server. This vTPM Manager handles the creation and deletion of virtual TPMs, providing fault tolerance mechanism and also scalability feature for the whole system. By using this framework, users who do not have a TPM residing in their device would be able to remotely access the TPM server to utilize the TPM functionalities with the assurance of a fault tolerance mechanism and the number of users is unlimited since it is scalable.

Norazah Abd Aziz, Putri Shahnim Khalid
Security and QoS relationships in Mobile Platforms

Mobile platforms are becoming a fundamental part of the user’s daily life. The human–device relationship converts the devices into a repository of personal data that may be stolen or modified by malicious users. Moreover, wireless capabilities open the door to several malicious devices, and mobility represents an added difficulty in the detection of malicious behavior and in the prevention of the same. Furthermore, smartphones are subject to quality of service (QoS) restrictions, due to users’ needs for multimedia applications and, in general, the need to be always-on. However, Security and QoS requirements are largely confronted and the mobility and heterogeneous paradigm on the Future Internet makes its coexistence even more difficult, posing new challenges to overcome. We analyze the principal challenges related with Security and QoS tradeoffs in mobile platforms. As a result of our analysis we provide parametric relationships between security and QoS parameters focusing on mobile platforms.

Ana Nieto, Javier Lopez
A Hybrid Natural Computing Approach for the VRP Problem Based on PSO, GA and Quantum Computation

In this paper, a novel hybrid natural computing approach, called PGQ, combining Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and quantum computation, is introduced to solve the Vehicle Routing Problem (VRP). We propose a quantum approach, called QUP, to update the particles in PSO. And, we add GA operators to improve population quality. The simulation results show that the PGQ algorithm is very effective, and is better than simple PSO and GA, as well as PSO and GA mixed algorithm.

Kehan Zeng, Gang Peng, Zhaoquan Cai, Zhen Huang, Xiong Yang
Finger Triggered Virtual Musical Instruments

With the current human movement tracking technology it is possible to build a real-time virtual musical instrument with a gestural interface which is similar to a real musical instrument. In this paper, a simple finger triggering based controller for virtual musical instruments is presented. The virtual musical instruments that can be operated by using this controller are piano and drum. This system consists of three main components; finger data glove system, musical notes recognition system, and data transceiver system. Finger triggering devices are mounted to each finger in a data glove. This finger data glove has the capability to get data from triggered devices and the attached microcontroller in the data glove system is used to receive the data before transmitted to the musical notes recognition system through wireless or wired transmission. The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. When the data is matched, the musical notes data will be playing the associated musical notes. The developed system has the ability to switch the virtual musical instruments between piano and drum. Nevertheless, this developed finger triggered virtual musical instruments has the real-time capability to analyze the sounds or musical notes that have yet encountered in the studio.

Chee Kyun Ng, Jiang Gi Fam, Nor Kamariah Noordin
A Low Complexity Multi-Layered Space Frequency Coding Detection Algorithm for MIMO-OFDM

In this paper, a low complexity multi-layered space frequency OFDM (MLSF-OFDM) coding scheme is presented with the proposed two detection algorithms, fast QR decomposition detection algorithm or denoted as FAST-QR and enhanced FAST-QR (E-FAST-QR). Both algorithms not only reduce the implementation complexity of QR decomposition but also show a good performance in terms of bit error rate (BER). Hence, the proposed detection algorithms can be used to maintain guaranteed quality of service (QoS) in MIMO-OFDM system.

Jin Hui Chong, Chee Kyun Ng, Nor Kamariah Noordin, Borhanuddin Mohd. Ali
Dynamic Transmit Antenna Shuffling Scheme for MIMO Wireless Communication Systems

In this paper, two novel dynamic transmit antenna shuffling schemes, namely ‘Optimal’ and ‘Max STBC’, are presented in order to reduce the interference in V-BLAST/STBC scheme. These antenna shuffling schemes with the channel state information (CSI) from the receiver, which significantly improves performance of the MIMO system in Rayleigh flat-fading channels by selecting the appropriate antenna shuffling pattern, have been compared with a few other related schemes in terms of BER and system capacity. The ‘Optimal’ antenna shuffling scheme improves the BER performance significantly with a gain of 2 dB at BER of 10

–3

compared to all other schemes, while the ‘Max STBC’ antenna shuffling scheme enhances the V-BLAST/STBC system capacity by 4 %.

Jin Hui Chong, Chee Kyun Ng, Nor Kamariah Noordin, Borhanuddin Mohd. Ali
A Low Complexity V-BLAST/STBC Detection Algorithm for MIMO System

In this paper, a new low complexity detection algorithm for V-BLAST/STBC scheme based on QR decomposition, denoted as low complexity QR (LC-QR), is presented. The performance of the proposed LC-QR decomposition detection algorithm in V-BLAST/STBC transceiver scheme is investigated with other MIMO systems, such as ZF, MMSE and QR decomposition schemes. It is shown that the BER performance in V-BLAST/STBC scheme is better than V-BLAST scheme while its system capacity is higher than orthogonal STBC scheme when the LC-QR is exploited.

Jin Hui Chong, Chee Kyun Ng, Nor Kamariah Noordin, Borhanuddin Mohd. Ali
A Grid-Based Cloaking Scheme for Continuous Location-Based Services in Distributed Systems

Recently, many people are using location-based services (LBSs). However, since users continuously request LBS queries to LBS server by sending their exact location data, their privacy information is in danger. Therefore, cloaking schemes have been proposed to protect the user’s location privacy. However, because the existing techniques generate a cloaking area in a centralized manner, an anonymizer suffers from performance degradation and security problem. Therefore, a cloaking scheme based on distributed system is required for the safe and comfortable use of LBSs by mobile users. In this paper, we propose a grid-based cloaking scheme for continuous location-based services in distributed systems. The proposed scheme stores information and performs operations in a distributed manner to create a cloaking area. Finally, we show from a performance analysis that our cloaking scheme shows better performance than the existing centralized cloaking schemes.

Hyeong-Il Kim, Jae-Woo Chang
Occluded and Low Resolution Face Detection with Hierarchical Deformable Model

This paper presents a hierarchical deformable model for robust human face detection, especially with occlusions and under low resolution. By parsing, we mean inferring the parse tree (a configuration of the proposed hierarchical model) for each face instance. In modeling, a three-layer hierarchical model is built consisting of six nodes. For each node, an active basis model is trained, and their spatial relations such as relative locations and scales are modeled using Gaussian distributions. In computing, we run the learned active basis models on testing images to obtain bottom-up hypotheses, followed by explicitly testing the compatible relations among those hypotheses to do verification and construct the parse tree in a top-down manner. In experiments, we test our approach on CMU+MIT face test set with improved performance obtained.

Xiong Yang, Gang Peng, Zhaoquan Cai, Kehan Zeng
Negotiated Economic Grid Brokering for Quality of Service

We demonstrate a Grid broker’s job submission system and its selection process for finding the provider that is most likely to be able to complete work on time and on budget. We compare several traditional site selection mechanisms with an economic and Quality of Service (QoS) oriented approach. We show how a greater profit and QoS can be achieved if jobs are accepted by the most appropriate provider. We particularly focus upon the benefits of a negotiation process for QoS that enables our selection process to occur.

Richard Kavanagh, Karim Djemame
Differential Fault Analysis on HAS-160 Compression Function

In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.

Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong
A New Energy-Efficient Routing Protocol Based on Clusters for Wireless Sensor Networks

Recently, Wireless Sensor Network (WSN) has been broadly studied in ubiquitous computing environments. In WSN, it is important to reduce communication overhead by using an energy-efficient routing protocol because the resources of the sensor node are limited. Although there exist some cluster-based routing protocols, they have some problems. First, the random selection of a cluster head incurs a node concentration problem. Secondly, they have a low reliability for data communication due to the less consideration of node communication range. To solve these problems, we, in this paper, propose a new energy-efficient cluster-based routing protocol. To resolve the node concentration problem, we design a new cluster head selection algorithm based on node connectivity and devise cluster maintenance algorithms. Moreover, to guarantee data communication reliability, we use message success rate, which is one of popular measures for data communication reliability, in order to select a routing path. Through our performance analysis, we show that our protocol outperforms existing schemes in terms of communication reliability and energy efficiency.

Min Yoon, Jae-Woo Chang
MIDI-to-Singing Online Karaoke for English M-Learning

This research reports a proposal for learning English by using MIDI-to-Singing Karaoke in a mobile environment. Such an application is about an ongoing work of a “MIDI-to-Singing” system which is capable of generating synthesized singing based on a given MIDI melody. Considering that the mobile-phone has had a boom in the recent years, we have developed an online Karaoke that makes lifelong learning something natural and effective for English m-learning. In this demonstration, MIDI music, synthesized singing voice, lyrics and background photos are well aligned to compose a Karaoke video. Based on a HTML5 GUI design, we describe existing implementations for putting subtitles and captions alongside the HTML5 <video> tag inside Web pages and a proposal for standardizing such Karaoke application. We believe that using the MIDI-to-Singing online Karaoke as an educational tool will contribute to the success of English learning students.

Hung-Che Shen, Chung-Nan Lee
A New Cloaking Method Based on Weighted Adjacency Graph for Preserving User Location Privacy in LBS

The propagation of position identifying devices, such as Global Positioning System (GPS), becomes increasingly a privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/her exact location to the LBS. So, it is a key challenge to efficiently preserve user’s privacy while accessing LBS. For this, the existing method employs a framework that not only hides the actual user location but also reduces bandwidth consumption. However, it suffers from privacy attack for a long term observation of user behaviour. Therefore, we aim to provide the solutions which can preserve user privacy by utilizing k-anonymity mechanism. In this paper, we propose a weighted adjacency graph based k-anonymous cloaking technique that can provide protection to user and also reduce bandwidth usages. Our cloaking approach efficiently supports k-nearest neighbor queries without revealing private information of the query initiator. We demonstrate via experimental results that our algorithm yields much better performance than the existing one.

Miyoung Jang, Jae-Woo Chang
Simulation Videos for Understanding Occlusion Effects on Kernel Based Object Tracking

Occlusion handling is one of the most studied problems for object tracking in computer vision. Many previous works claimed that occlusion can be handled effectively using Kalman filter, Particle filter and Mean Shift tracking methods. However, these methods were only tested on specific task videos. In order to explore the actual potential of these methods, this paper introduced 64 simulation video sequences to experiment the effectiveness of each tracking methods on various occlusion scenarios. Tracking performances are evaluated based on Sequence Frame Detection Accuracy (SFDA). The results showed that Mean shift tracker would fail completely when full occlusion occurred. Kalman filter tracker achieved highest SFDA score of 0.85 when tracking object with uniform trajectory and no occlusion. Results also demonstrated that Particle filter tracker fails to detect object with non-uniform trajectory. The effect of occlusion on each tracker is analyzed with Frame Detection Accuracy (FDA) graph.

Beng Yong Lee, Lee Hung Liew, Wai Shiang Cheah, Yin Chai Wang
Originator Recognition (or) Path Recovery Mechanism for Load-Based Routing Protocol

6LoWPAN has become a new technology to provide the internet connectivity to the traditional WSN. The introduction of 6LoWPAN adaptation layer enables the smooth delivery of packet from network layer to MAC layer. In this paper, the LOAD-based routing protocol with the proposed originator recognition (OR) path recovery mechanism is introduced. The proposed OR path recovery mechanism modifies the IETF conceptual LOAD protocol message by inserting an identity key in the generated RERR message. The identity key is then used by the originator of a failed data packet to initialize path recovery during the link failure. The developed OR-LOAD has examined under the 6LoWPAN environment in Qualnet simulator. Its performance is evaluated and compared to AODV in terms of packet delivery ratio and throughput.

Gee Keng Ee, Chee Kyun Ng, Fazirulhisyam Hashim, Nor Kamariah Noordin, Borhanuddin Mohd. Ali
Analysis of Correlation Peak Position Modulation

This paper extends the peak position modulation (PPM) technique introduced by Nah and Kim (Image Watermarking for Identification Forgery Prevention) and provides a detailed performance analysis. The proposed correlation peak position modulation (CPPM) significantly improves the tradeoff between fidelity and robustness in comparison with traditional watermarking approaches such as spread spectrum modulation and position based watermarking. CPPM ensures robustness and sufficient capacity which is modulated by user information. Theoretical analyses and experimental results were provided to compare with the performance of the spread spectrum technique and position based watermarking. These analyses and experiments confirm the proposed algorithm is a competitive method for image watermarking.

Jihah Nah, Jongweon Kim
Simulation Study on Distribution of Control Points for Aerial Images Rectification

A raw uncalibrated aerial image acquired from a non-metric digital camera carried by an aircraft normally has lens and perspective distortions. However, geometric distortions are not occurred individually but accumulated irregularly in aerial images. Ground control points are important features used and geometric transformation is the essential process in non-parametric approach for aerial image rectification. The efficiency of the rectification would be affected if the control points are allocated in the image without considering the proper distribution. A simulation study is conducted using grid image and aerial images to examine the effect of different distribution patterns of control points. It demonstrates that lower order global transformation has limitation in rectifying images with complex distortions and images with different distribution patterns of control points have different deformation rates.

Lee Hung Liew, Beng Yong Lee, Yin Chai Wang, Wai Shiang Cheah
A Secure Image Watermarking Using Visual Cryptography

In this paper we proposed a secure image watermarking algorithm for digital image using the visual cryptography. The proposed algorithm operates in discrete cosine transform (DCT) and discrete fractional random transform (DFRNT) domain which is characterized by fractional order α and random seed β. In the watermark embedding process of the proposed algorithm some blocks of a cover object is selected randomly, and they are transformed to DFRNT domain. The watermark is generated by the visual cryptography and embedded into the DCT coefficient of the DFRNTed block. The watermark extraction process is the reverse process of embedding process. The proposed watermarking algorithm has high security by the visual cryptography and the randomness of discrete fractional random transform. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against JPEG compression, common image processing distortions.

Xun Jin, JongWeon Kim
Bit Error Rate Analysis of Partial Packets in Ad hoc Wireless Networks

An Ad hoc wireless network environment is constructed and the number of errors in partial packets, bit error time series, is collected to study bit error rate of wireless burst-error channels. It is verified that the bit error time series is chaotic by computing maximal lyapunov exponent. The self-similarity of the bit error time series is also validated using the rescaled range (R/S) method, the aggregated variance time (V/T) method, absolute moment method and periodic diagram method respectively. Our research results show that we can utilize the complex non-linearity system theory such as chaos and self-similarity to study the number of errors in a partial packet. It is very important for evaluating bit error rate of wireless burst-error channels and prediction of the bit error ratio of a partial packet in Ad hoc wireless network.

Jia Lu, XinBiao Gan, Gang Han, Baoliang Li, Wenhua Dou
An Interaction System Architecture and Design between Smart Computing and Cloud Computing

This paper discusses both cloud computing and smart computing and then debates structural and functional issues about how the two computing systems interact for offering user-friendly information solutions. Smart Table is proposed to configure cloud resources. Smart control algorithm is proposed to choose the best resources. The information interaction between cloud computing and smart computing services is realized for efficient construction of information systems and for user’s convenience of information services.

Tae-Gyu Lee, Seong-Hoon Lee, Gi-Soo Chung
A Virtual Machine Scheduling Algorithm for Resource Cooperation in a Private Cloud

In recent years, virtualization has been widely applied in cloud computing because of its ability to increase resource utilization. With the scale of cloud computing architecture becoming larger, efficient resource allocation has also become more important. Existing scheduling algorithms for virtual machines cannot use new information to decide upon allocation of the appropriate physical machines because current scheduling algorithms lack the ability to be updated with up-to-the-minute information about each physical machine when making allocations. This situation means a physical machine can be assigned too many virtual machines, thereby causing overloading situations. Therefore, a more efficient and flexible architecture to allocate resources is needed. In this study, we present a cloud architecture and Layered Calculation Virtual Machine Allocation (LCVMA), to perform exceptionally well in terms of achieving above goals. With this architecture and algorithm, we can identify the physical machines with low workloads, and service providers can allow users to use resources more efficiently. The threshold in our mechanism presents possibilities for reducing overload situations. Resource utilization and allocation can therefore become more efficient and economical.

Ruay-Shiung Chang, Yao-Chung Chang, Ren-Cheng Ye
Heterogeneous Core Network Architecture for Next-Generation Mobile Communication Networks

With the increasing value-added services of information and mobile networks, the problem of insufficient bandwidth is posing the greatest challenge. To resolve this issue, the LTE (Long Term Evolution) of the 3G Partnership Project (3GPP) and the IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) are using IP-based next-generation network architectures to actively develop the 4G mobile communications network. The main purpose of this study was to examine the development and applications of the key technologies for the next generation heterogeneous mobile communications network architecture. On the basis of the Estinet7.0 simulation platform, this study simulated the implementation of interworking LTE and WiMAX scenarios. The core network architectures of LTE and WiMAX and their components’ functions were first introduced, and then the interoperability scenarios of 4G network technology co-existence and integration were analyzed. Next, this study explored the handover mechanism and other factors of consideration. Based on the signal sign, both in concept and in practice, a rule-based communications service architecture for the handover authentication mechanism was proposed, which could provide a heterogeneous network integration service architecture for the seamless transition of LTE and WIMAX networks without damaging the respective domains of the networks. The proposed architecture is expected to extend the interoperability between LTE and WiMAX systems in a simpler and faster way in the future.

Yao-Chung Chang
A Novel Learning Algorithm Based on a Multi-Agent Structure for Solving Multi-Mode Resource-Constrained Project Scheduling Problem

The resource-constrained project scheduling problem (RCPSP) includes activities which have to be scheduled due to precedence and resource restrictions such that an objective is satisfied. There are several variants of this problem currently, and also different objectives are considered with regards to the specific applications. This paper tries to introduce a new multi-agent learning algorithm (MALA) for solving the multi-mode resource-constrained project scheduling problem (MMRCPSP), in which the activities of the project can be performed in multiple execution modes. This work aims to minimize the total project duration which is referred to its makespan. The experimental results show that our method is a new one for this specific problem and can outperform other algorithms in different areas.

Omid Mirzaei, Mohammad-R. Akbarzadeh-T.
Security Analysis of the Keyschedule of ARIA-128

A Korean standard block cipher ARIA is a 128-bit block cipher supporting 128-, 192- and 256-bit secret keys. It is well known that an attacker should obtain at least four consecutive round keys or particular two round keys in order to recover the secret key of ARIA-128. In this paper, we propose the method to recover the secret key by using only the last round key. The proposed method is based on a guess-and-determine attack, which requires the computational complexity of

$$ O\left( {2^{68} } \right) $$

. To our knowledge, this result did not introduced so far.

HyungChul Kang, Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
Estimating Number of Columns in Mixing Matrix for Under-Determined ICA Using Observed Signal Clustering and Exponential Filtering

Under-determined Independent Component Analysis arises in a variety of signal processing applications, including speech processing. In this paper, we proposed a new approach focusing on the estimation of the number of columns and their values of the mixing matrix. The method is based on the observation that the observed vectors must be clustered along the direction of the column vectors of the mixing matrix. A new clustering measure and cluster direction finding are introduced. The propose algorithms are tested with real speech signals and compared with both AICA method and Information Index Removal, Perturbed Mean Shift Algorithm. Our result gives the correct number of columns with higher accuracy under the performance measure of algebraic matrix distance index.

Charuwan Saengpratch, Chidchanok Lursinsap
Realization of Coordinative Control Between Multi Readers and Multi RF-SIM Cards Under Mobile RF-SIM Mode

RF-SIM card is a highly integrated system which packets a 2.45 GHZ radio frequency interface chip and a high-security payment chip to an ordinary SIM card. In order to solve the identifications and accesses of multi readers to multi RF-SIM cards. We make full use of the ability of 2.45 GHZ frequency which supports multi channels to divide RF-SIM channel into three types of channel: reservation channel, coordination channel and working channel. The RF-SIM reader should reverse a coordination channel before inquiring RF-SIM cards. After the reservation then it inquires the RF-SIM cards within its communication area. RF-SIM card takes turns to select a coordination channel to response card randomly. After the successful handshaking then RF-SIM card turns to a working channel to transmit datum. This method can effectively solve the identifications and accesses of multi readers to multi RF-SIM cards. The approach of its realization is proposed.

Songsen Yu, Yun Peng, Xiaopeng Huang
Effects of Smart Home Dataset Characteristics on Classifiers Performance for Human Activity Recognition

Over the last few years, activity recognition in the smart home has become an active research area due to the wide range of human centric-applications. A list of machine learning algorithms is available for activity classification. Datasets collected in smart homes poses unique challenges to these methods for classification because of their high dimensionality, multi-class activities and various deployed sensors. In fact the nature of dataset plays considerable role in recognizing the activities accurately for a particular classifier. In this paper, we evaluated the effects of smart home datasets characteristics on state-of-the-art activity recognition techniques. We applied probabilistic and statistical methods such as the Artificial Neural network, Hidden Markov Model, Conditional Random Field, and Support Vector Machines. The four real world datasets are selected from three most recent and publically available smart home projects. Our experimental results show that how the performance of activity classifiers are influenced by the dataset characteristics. The outcome of our study will be helpful for upcoming researchers to develop a better understanding about the smart home datasets characteristics in combination with classifier’s performance.

Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee
Activity Recognition Based on SVM Kernel Fusion in Smart Home

Smart home is regarded as an independent healthy living for elderly person and it demands active research in activity recognition. This paper proposes kernel fusion method, using Support Vector Machine (SVM) in order to improve the accuracy of performed activities. Although, SVM is a powerful statistical technique, but still suffer from the expected level of accuracy due to complex feature space. Designing a new kernel function is difficult task, while common available kernel functions are not adequate for the activity recognition domain to achieve high accuracy. We introduce a method, to train the different SVMs independently over the standard kernel functions and fuse the individual results on the decision level to increase the confidence of each activity class. The proposed approach has been evaluated on ten different kinds of activities from CASAS smart home (Tulum 2009) real world dataset. We compare our SVM kernel fusion approach with the standard kernel functions and get overall accuracy of 91.41 %.

Muhammad Fahim, Iram Fatima, Sungyoung Lee, Young-Koo Lee
Secure Anonymous Conditional Purchase Order Payment Mechanism

In this paper, an Anonymous Conditional Purchase Order (ACPO) payment system is proposed which is an electronic payment system suitable for the real world. It not only keeps the high efficiency of previous buyer-driven systems but also strengthens the anonymity between customers and banks. The customers can advertise and put ACPO on the web according to their requirements, and then the merchants can evaluate which ACPO is appropriate for trade in any particular web site. Besides, timestamp will solve the problem of non-dispute and make our scheme more flexible. For example, customers can modify their ACPO to suit the merchant if they are not getting any response from the merchant with whom they want to trade.

Wei-Chen Wu, Horng-Twu Liaw
Trustworthiness Inference of Multi-tenant Component Services in Service Compositions

This paper presents a novel approach to the inference of trustworthiness of individual components shared between multiple composite services in distributed services environments. In such environments, multiple component services are orchestrated from distributed providers to create new value-added services. A component service can be shared by several distributed compositions. A composite service is offered to its consumers who rate its reliability and satisfaction after each transaction. However, since composite services are provided as an integrated service it is not possible to attribute failures or causes of dissatisfaction to individual components in isolation. A collaborative detection mechanism can provide a solution to the evaluation of component trustworthiness based on consumer reporting of composite service execution results.

Hisain Elshaafi, Dmitri Botvich
Enhanced Middleware for Collaborative Privacy in Community Based Recommendations Services

Recommending communities in social networks is the problem of detecting, for each member, its membership to one of more communities of other members, where members in each community share some relevant features which guaranteeing that the community as a whole satisfies some desired properties of similarity. As a result, forming these communities requires the availability of personal data from different participants. This is a requirement not only for these services but also the landscape of the Web 2.0 itself with all its versatile services heavily relies on the disclosure of private user information. As the more service providers collect personal data about their customers, the growing privacy threats pose for their patrons. Addressing end-user concerns privacy-enhancing techniques (PETs) have emerged to enable them to improve the control over their personal data. In this paper, we introduce a collaborative privacy middleware (EMCP) that runs in attendees’ mobile phones and allows exchanging of their information in order to facilities recommending and creating communities without disclosing their preferences to other parties. We also provide a scenario for community based recommender service for conferences and experimentation results.

Ahmed M. Elmisery, Kevin Doolin, Ioanna Roussaki, Dmitri Botvich
A New k-NN Query Processing Algorithm Using a Grid Structure for Mobile Objects in Location-Based Services

In telematics and location-based service (LBS) applications, because moving objects usually move on spatial networks, their locations are updated frequently, leading to the degradation of retrieval performance. To manage the frequent updates of moving objects’ locations in an efficient way, we propose a new distributed grid scheme which utilizes node-based pre-computation technique to minimize the update cost of the moving objects’ locations. Because our grid scheme manages spatial network data separately from the Point of Interests (POIs) and moving objects, it can minimize the update cost of the POIs and moving objects. Using our grid scheme, we propose a new k-nearest neighbor (k-NN) query processing algorithm which minimizes the number of accesses to adjacent cells during POIs retrieval in a parallel way. Finally, we show from our performance analysis that our k-NN query processing algorithm is better on retrieval performance than that of the existing S-GRID.

Seungtae Hong, Jaewoo Chang
An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme

In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper will proposed the Levinthal’s paradox and protein structure essential computation elements on the basis of diversity property of immune systems that satisfy with confusion property of symmetric encryption scheme. This paper measures and analysis the confusion property of the permutation function of a block cipher using the correlation coefficient statistical analysis to identify whether it satisfies Shannon’s confusion property. From the analysis carried out, the permutation function block cipher increased the performance of the confusion property, hence, indicating a high non-linear relationship between plaintext and ciphertext in symmetric encryption scheme.

Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal, Kamel Ariffin
New Bilateral Error Concealment Method of Entire Depth Frame Loss for 3DTV and Virtual 3D Videoconferencing Systems

In three-dimensional television and 3D videoconferencing systems, depth entire frame loss will degrade the video quality. In this paper, a bilateral error concealment algorithm of the depth entire frame loss is proposed, which utilizes strong temporal correlation and movement correlations between the depth video and its corresponding 2D color video. Experimental results show that the proposed algorithm can conceal the lost entire depth frame and provide better subjective and objective quality of the reconstructed images.

Fucui Li, Gangyi Jiang, Mei Yu, Xiaodong Wang, Feng Shao, Zongju Peng
A REST Open API for Preventing Income Tax Over-Payment by Auditing Year-End Tax Settlement

RESTful web service everlopers to easily deploy their web service through HTTP protocol. Even though almost all WTO countries’ tax law explicitly states the tax incentive to subsidies for research and development, many companies often incorrectly classify the subsidies for research as a taxable income not as a non-taxable income, resulting in over payment of tax for employee. Therefore, we introduce a RESTful Open API for checking whether earned income year-end tax settlement is correct or not. This API automatically audits the tax settlement by some required numbers from the earned income withholding receipt.

Min Choi, Sang-Soo Yeo
BAT: Bimodal Cryptographic Algorithm Suitable for Various Environments

In this paper, we propose a new bimodal cryptographic algorithm BAT. BAT provides a hash function BAT-H and a block cipher BAT-B. Moreover, according to some parameters, it is possible to combine BAT-H and BAT-B to one integrated module. Thus, the algorithm is suitable for various environments, such as RFID and USN, where a hash function and a block cipher are required simultaneously. From our implementation results, our integrated module is more efficient than the case of the combination of known dedicated hash functions and block ciphers.

Jesang Lee, Kitae Jeong, Jinkeon Kang, Yuseop Lee, Jaechul Sung, Ku-Young Chang, Seokhie Hong
Applying Forensic Approach to Live Investigation Using XeBag

The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects’s systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. It is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation in live system. On the other hand, if we just acquire essential files from target computer, it is not suitable forensically soundness. Therefore, we need to use standard digital evidence container to prove integrity and probative of evidence from various digital sources. In this article, we describe a forensic approach to live investigation using Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

Kyung-Soo Lim, Changhoon Lee
The Development of an Internet-Based Knowledge Management System for Adapted Physical Education Service Delivery

The purpose of this study is to develop an internet-based system for the actual implementation and practice of knowledge management to support adapted physical education service delivery by using distributed knowledge accumulated through exchanging and sharing case studies among different schools and educational institutions over the Internet, and to evaluate the effectiveness of the newly developed system by asking the adapted physical education teachers. The results are as follows: This system makes it easy to archive and share classroom teaching information, and also supports collaboration among people in different schools and educational institutions. It also permits new teachers who lack expertise and actual classroom experience to work on case studies in collaboration with experienced APE specialists from other schools, and thereby improve their skills in teaching children with disabilities.

Jong-Jin Bae, Jung-Chul Lee, Min-Woo Cheon, Seung-Oh Choi
Intangible Capital, Opportunity Exploitation and Institutional Endorsement in Emerging IT Industry

In early stage of entrepreneurial process, an entrepreneur makes the best use of his/her human and social capital to overcome the liability of newness. In this study, we define human/social capital aspects of an entrepreneur’s personal resources “intangible capital”. We investigate how intangible capital of an entrepreneur influences their ability to exploit business opportunity in a promising industry and to induce venture capital investment. The data come from Korean startups in information technology industry. An empirical analysis of 357 firms gone public in the KOSDAQ market shows that an entrepreneur with prior relevant work experience and network in related firm more likely exploit business opportunity in a promising industry and induce venture institutional endorsement. The managerial background of an entrepreneur turns out to be a more important factor than education.

Choi Youngkeun
A Virtualization Security Framework for Public Cloud Computing

Cloud computing is very efficient and useful technology for many organizations with its dynamic scalability and usage of virtualized resources, infrastructure, software and platform as a service through the Internet. Also, virtualization is a technology that has been widely applied for sharing the capabilities of physical computer’s resources and software. Therefore, in order to increase the usage performance of cloud computing resources, virtualization was used. This research aims to make a virtualization framework for cloud computing. The framework was considered security service process with virtual machines and used in public cloud computing.

Jong Hyuk Park
Environmental Awareness in Green Supply Chain and Green Business Practices: Application to Small and Medium-Sized Enterprises

This study investigates how the green business activities can be affected by awareness of green supply chain management (SCM) and existing cost reduction behaviors. To this end, this study conducts an empirical research of small and medium-sized enterprises based on a questionnaire survey method. This study shows green business practices are affected by types of industry, but not by the awareness of green SCM and current cost reduction activities.

Se-Hak Chun, Ho Joong Hwang, Young-Hwan Byun
Computational Analysis of the Bargaining Power and Channel Strategies in Supply Chain Relationship

This paper analyzes hybrid channel strategies of a manufacturer when it considers an online store using analytical and computational simulation methods, and discusses some strategic implications from the perspective of market transaction costs and the portion of online customers.

Se-Hak Chun
New Hybrid Data Model for XML Document Management in Electronic Commerce

XML has been known as a document standard in representation and exchange of data on the Internet, and is also used as a standard language for the search and reuse of scattered documents on the Internet. The issues related to XML are how to model data on effective and efficient management of semi-structured data and how to actually store the model data when implementing a XML contents management system. This paper considers a relational data system to store XML document efficiently and propose a hybrid data model for XML document management.

Eun-Young Kim, Se-Hak Chun
A Study on Advanced Penetration Testing and Defensive Schemes for Web Service Vulnerability Analyses

In modern society, due to the popularity of web service, the risk of information leakage has increased. To reduce web service security incidents, web service providers must understand the possible vulnerabilities and the necessary responses. A number of web services exist that are not patched for security about open vulnerabilities. Thus, because of the possibility of new hacking techniques, a new security solution study is required. In this thesis, we suggest the advanced penetration testing and defensive Scheme for Web service (ASW) security of which was reinforced. This ASW model offers improved penetration testing and defensive schemes to analyze vulnerabilities to respond to new hacking techniques.

Ji Soo Park, Chang-Hyun Mun, Chul Ho Shin, Jong Hyuk Park
Orthogonal Unified Buffer with Memory Efficiency

In this paper, we introduce an Orthogonal Unified Buffer (OUB), which is an extension of the Layered Depth Cube (LDC) as an alternative to the Orthogonal Frame Buffer (OFB). Compared to the OFB, the OUB achieves significant improvement in memory efficiency, which enables a high-resolution representation of 3D models that have various depth-complexities. Similar to the OFB, the OUB resamples the surface nearly uniformly while conserving data locality. As a grid-based texture mapping method, the OUB shows satisfactory memory efficiency and is independent of an object’s shape or topology. Our method is built and handled on the GPU, thus it is well suited for real-time rendering.

SangHyun Seo, JaeMoon Choi
The Study on Smart Sensor Network Based Production Management Service Design

The small and medium-sized manufacturers, which produce a small amount of different items, have a problem in terms of cost and time that is difficult to introduce automated production process control system for manufacturing and management of new products. In addition, companies’ ERP systems could not cope with real-time errors arisen from production processes dealing with actual logistics. And companies recently focus on introduction of Smart sensors for managing production processes, however, they have difficulty in optimizing deployment suitable to the corresponding company’s process by prioritizing only the technological introduction. Accordingly, this paper analyzed the production process currently used for manufacturing, and designed and implemented a production process control system that could deploy optimized Smart sensors and connect with them based on the analysis.

Hangbae Chang
R&D Intensity and Productivity: Evidence from IT Firms versus Non-IT Firms in KOSDAQ Market

We investigate the effects of R&D intensity on efficiency of productivity in non-IT firms and IT firms, in a sample taken from the KOSDAQ market over the period 2000–2011. The main empirical result is as follows: First, by comparing production efficiency between IT firms and non-IT firms, we find that R&D intensity has a positive effect on production efficiency and plays an important role in production growth. Second, R&D intensity of Non IT firm is relatively smaller than IT firms compared. Third, performance (Tobin’s Q or ROA) of IT firms is more sensitive to productivity of R&D intensity than that of non-IT firms, and stock market is favorable to firms with high level of productivity of R&D intensity.

SungSin Kim
An Improved CRT-based Broadcast Authentication Scheme in WSNs

As wireless sensor networks (WSNs) are increasingly widespread, probability of being under attack also will soar, so the security of WSNs has raised more concern. Broadcast communication plays an important role in WSNs due to the existence of a large number of sensor nodes and the broadcast nature of wireless communications. Therefore, the security of broadcast communication directly relates the safety of the entire network. Authentication is one of the basic security services needed to construct a practical WSNs. In this paper, we present a high-security broadcast authentication protocol. Our proposal combines time synchronization with the Chinese Remainder Theorem (CRT) to implement dual authentication. As a result, this scheme has greatly improvement to some existed schemes in term of security.

Yunjie Zhu, Yu Shen
Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus Framework

With the application of new technologies such as pervasive wireless computing and RFID, the theoretical foundation and technical support of smarter campus are evolved rapidly. Especially, the campus security in children surveillance has been regarded as a critical issue. This work establishes a smart campus framework based on innovative RFID services. The Tabu search strategy and optimal deployment mechanism are used to find the better locations of deploying readers. In order to keep the safety of campus, this framework analyzes and designs five innovative scenarios toward children surveillance, including campus gate management service (CGMS), student temperature anomaly management service (STAMS), hazardous area management service (HAMS), campus visitor management service (CVMS) and campus equipment management service (CEMS). Then, the pervasive RFID services of five scenarios are implemented in the campus according to the demand from parents’ and teachers’ point of view. The middleware of the proposed framework adapts to collect both active/inactive RFID tags deployed around the campus, processes and filters the necessary information and events generated by the RFID reader from different locations or user rules. Finally, this work is successfully deployed and currently in use by the National Taitung University Laboratory Elementary School with more than 150 students and 30 administration staffs and faculties. Compared to traditional dense mechanisms, this mechanism has a 36 % lower deployment cost.

Yao-Chung Chang
Towards Analyzing Family Misconfiguration in Tor Network

As one of the most popular low-latency anonymous communication systems in the world, Tor has become the research hotspot recent years. However, disproportionately little attention has been paid to Tor family design, a feature that plays an important and irreplaceable role in Tor network. This paper gives an analysis of family misconfiguration in Tor network. Two types of family misconfigurations together with the corresponding methods that discover and correct them are presented. The experiment over live Tor network data confirms the pervasiveness of family misconfigurations in Tor network. Besides, families misconfigurations discovered in the experiment as well as methods used to determine and correct them may not only help Tor operators to make family declarations correctly, but also help Tor client to avoid potential risk when constructing circuits.

Xiao Wang, Jinqiao Shi, Guo Li
Intelligent Heterogeneous Network Worms Propagation Modeling and Analysis

As many people rely on Internet and Mobile network communications for business and everyday life, the integration of these two networks called heterogeneous network is unavoidable in the future. In this paper, we analysis an intelligent worms in Heterogeneous network called H-worm which is unlike scanning worms such as Code Red or Slammer. It spreads through transferring files with regulating computing resource consuming (CRC) to avoid user security awareness. To well study the H-worm and find the difference between H-worm and traditional worms, we present an H-worm simulation model, divided into connection probability, opening probability, host-defense and CRC. From the results, we give an empirical rule to keep a high propagation speed and some advises on defense H-worm.

Wei Guo, Lidong Zhai, Yunlong Ren, Li Guo
The Design of Remote Control Car Using Smartphone for Intrusion Detection

This paper proposes the use of remote control car for intrusion detection. The scheme concerns the use of a camera, remote control car, TCP server and smartphone. The arrangement allows us to observe any given location in real time, through a camera mounted on the RC car. The RC car is controlled by a computer via Bluetooth and the commands to the computer can be sent using a smartphone application through a TCP network. As an example application the arrangement was used to observe a residence by obtaining images from there at specified intervals. Application of Bluetooth for computer to RC car communication has allowed the achievement of maximum communication speed and we have also shown that the proposed scheme has less BER.

Chang-Ju Ryu

Computerized Applications for the Sustainable Development of Aviation Industry

Frontmatter
The Impact of Systems Engineering on Program Performance: A Case Study of the Boeing Company

This study provides clear empirical evidence that Systems Engineering (SE), when implemented by Program Management (PM), drives improvements in program performance. During a three-year interval, SE processes were systematically integrated into The Boeing Company’s Program Management Best Practices (PMBP) on the multi-purpose airlifter program. Given SE processes providing a foundation for high-quality PM, program managers heavily rely upon project team members to consistently implement SE processes throughout the project lifecycle to ensure successful program performance. The study’s results indicate that a strong and positive correlation exists between the implementation of SE processes and program performance improvements.

Samuel K. Son, Sheung-Kown Kim
IT Framework and User Requirement Analysis for Smart Airports

An airport is a physical site where aircrafts take off and land, and passengers head to their destinations through a series of arrival and departure processes. But it takes considerable time to go through the immigration process, security checks, and other airport-associated processes. As a result of reviewing airport processes in order to increase airport productivity and improve the passenger convenience, we divide passenger-related processes into three sub-processes, namely u-Fast Passenger, u-Guidance, and mobile services. To better explain a series of improvements in the process, a new paradigm of “Smart Airport Service Framework” is presented. This delivers a faster and more convenient service for passengers and improves the work process and resource utilization. Consequently, passengers are enabled to enjoy and be entertained by the airport facilities with this way of saving time, while the airport authority can enjoy additional profit.

Sei-Chang Sohn, Kee-Woong Kim, Chulung Lee
The Framework Development of a RFID-Based Baggage Handling System for Airports

This paper introduces a study of a Baggage Handling System (BHS) interface solution and the expected effects of applying a new Radio Frequency Identification (RFID) technology in the Incheon airport baggage handling facilities. In addition, this study suggests that the RFID application could improve the use of human and material resources. For example, this could lead to a decrease in the amount of delayed baggage by increasing the tag-read rate, improvements in convenience by providing baggage information, improvements in security screening efficiency, and a reduction in Minimum Connecting Time (MCT).

Chang-gi Kim, Kee-woong Kim, Youn-Chul Choi
A Modified Carbon Calculator for Enhanced Accuracy, Reliability and Understandability

Devices for calculating the carbon dioxide emissions from flights have been developed by several agencies. However, these carbon calculators introduce many assumptions to simplify the calculation process. As a result, the pre-existing calculators have deficiencies in general to be used as consumer references. This study assesses carbon calculators for aviation emissions and suggests a modified calculation methodology using the pre-existing computer reservation system. The new methodology is more accurate and sophisticated to support consumer participation in the carbon offset program or selection of more environmentally friendly airlines or routes in online reservation.

Gun-Young Lee, Kwang-Eui Yoo, Kee-Woong Kim, Bo-Myung Kim
A Framework for Developing Internet-Based Global Integrated Logistics Management System

This paper introduces a differentiated framework for an internet-based global integrated logistics management system (IGILMS) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, electronic data interchange (EDI), or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system.

Ho-Seon Hong, Ki-sung Hong, Kee-woong Kim, Chulung Lee
The Implication of Environmental Costs on Air Passenger Demand for Airline Networks

The aviation sector has developed dramatically in recent decades. However, environmental and social concerns are gradually posing limitations on the growth of the air transport industry. Air travel contributes to climate change, and causes significant environmental damage. It is therefore subject to environmental impact charges, which will intensify over time. These environmental charges will influence air travel. This research aims to investigate the impact of environment costs by examining their influence on air passenger demand within the context of two major airline network models: the hub-and-spoke network and the point-to-point network. The additional costs, caused by environmental rehabilitation, will affect both the networks and profit structures of airlines, and these structures will need to be amended in time. This study may contribute to the South Korean aviation industry, especially to the airlines that will be affected by the CO

2

constraints imposed by the European Union Emissions Trading System from 2012 onwards.

Baek-Jae Kim, Kwang-Eui Yoo
An Empirical Study on the Design Peak Hourly Traffic at a Major International Airport

Airports need to accommodate peak-time traffic, especially as the demand for air travel has increased dramatically in recent years. In small airports, the gap between hourly volume and design peak hourly traffic has little economic effect; however, it has a greater impact in larger airports. This study on the design peak hourly traffic in large airports showed that the value of the typical peak hour passenger (TPHP) is very similar to the value of inflection point that is used in the road design for estimating the design peak hourly traffic. It is expected that in large airports, the value of the TPHP and the cumulative traffic between 2.5 and 3.5 % would be preferable.

Sang-kyu Lee, Kee-Woong Kim, Youn-Chul Choi
Review of CRS in the Airline Industry: New Categorization with Previous Literatures

This paper was written to act as a new foundation of the Computer Reservation System (CRS) study approach. Although previous studies focused on various areas of the CRS industry, the short history of CRS and the change of business environments made previous researches unable to provide good intuition for later researchers. This paper conducted literary reviews to offer new categories based on the recent trends and activities in the CRS industry, and we believe the new categories can provide more valuable issues to study to future researchers.

Sun Oh Bang, Jaehwan Lee, Kee-woong Kim, Chulung Lee
Simulation Analysis for the Design of the Airport Security System

As the number of air passengers is rapidly increasing worldwide, airports have become more crowded, impairing their efficiency. One of the main reasons why airports are congested is the time required in the security check processes. This paper estimated the time required at the security check process at Incheon International Airport in 2015 based on a simulation; plans and strategies for the improvement are provided in light of the findings. It was concluded in the research that if the gates and search lines go through reforms, there will be a reduction 27 % of the time required at the time of the study.

Yoon-tae Sim, Sang-beom Park, Youn-chul Choi
Measuring Asia Airport Productivity Considering the Undesirable Output

It becomes important for airports to consider environmental aspects such as the concept of sustainable growth, especially for Asian airports growing and competing aggressively. Thus, it requires incorporating the environmental factor into the productivity indicator of airport and is important to understand how the efforts impact to their current performance and future competition. This paper used Data Envelopment Analysis (DEA) method including the two undesirable outputs to assess the productivity of 11 Asia airports. Inclusion in the analysis of airport operations with the undesirable effects leads to greater airport’s efficiency scores today and shed a further insight in a competitiveness and risk among Asia airports, when each Asian government extends their environment regulation and tax.

Sangjun Park, Chulung Lee
A Study on Aviation Technology Forecast for Sustainable (Green) Aviation Using Patent Analysis

For efficient technology development, prediction of directions for technology development in the future is important. In the present study, trends of changes in development of green aviation technology will be analyzed through patent analysis, and directions for development in the green aviation technology in the future will be predicted. The numbers of countries’ filed patents per year will be compared through an analysis of trends in the case numbers among quantitative analysis methods, and what technology areas are developed, with emphasis on the country to be analyzed through an analysis of companies with multiple filings. Finally, after preparing summary lists and worksheets with a qualitative analysis method, trends of technology development, along with directions for development of green aviation technologies in the future, will be predicted through preparation of a techno-map based on such results.

Hyejin Kwon, Chulung Lee

Signal Processing for Image, Video, and Networking

Frontmatter
A Vision-Based Universal Control System for Home Appliances

Based on computer vision techniques, this paper presents a universal remote control system for home appliances. This system consists of three major components: a paper control panel, a web camera wore on the user’s chest, and a laptop computer. The system operates as follows. First, the user points his finger tip to a virtual button on the paper panel to select a specific appliance. Second, a function button is pointed at to operate an assigned function. The user’s hand image is captured by the camera and the virtual button pointed by the fingertip is detected by computer vision techniques. Then a specific infrared code is emitted to control the corresponding appliance for a specific function. The advantage of this universal remote control system is that several remote controllers can be integrated together to simplify the operations of different appliances. The system performance is shown in the experimental results.

Chaur-Heh Hsieh, Ping S. Huang, Shiuh-Ku Weng, Chin-Pan Huang, Jeng-Sheng Yeh, Ying-Bo Lee
An IMU-Based Positioning System Using QR-Code Assisting for Indoor Navigation

In this paper, a positioning scheme combining inertial measurement unit (IMU) observation with QR code recognition is proposed to improve the location accuracy in an indoor environment. For the location-estimation technique, the proposed positioning scheme based on IMU observations is handled by the dead-reckoning (DR) algorithm; in terms of a QR-code-assisted calibration technique, the proposed approach is an accuracy enhancement procedure that effectively reduces the error propagation caused by DR approach. Namely, with the assisting approach to recognize the locations of the QR-code-reference nodes as landmarks, a DR-based scheme using the landmark information can calibrate the estimated location, and then the error propagation effect is reduced. The experimental results demonstrate that the location based on the proposed approach have much lower location errors in an IMU positioning platform. As compared with the non-QR-code-assisted approach, the proposed algorithm can achieve reasonably good performance.

Yih-Shyh Chiou, Fuan Tsai, Sheng-Cheng Yeh, Wu-Hsiao Hsu
A Visual-Audio Assisting System for Senior Citizen Reading

This paper proposes an augmented reality (AR) platform to solve problems of seniors’ eyesight deterioration. A finger detection technique is first employed to retrieve articles in newspaper captured by the AR platform, the extracted article is then enlarged by the bilinear interpolation. Furthermore, an image projection algorithm to recompose the text on the enlarge image thus provide an ideal visual reading interface. In addition, the proposed AR platform designs an audio assisting function for the senior to listen the extracted article in newspapers or magazines. The experiment results show that the proposed AR platform provides a good visual-audio interface for senior citizen.

Yu-Qi Li, Jia-Jiun Liu, Shih-Yu Huang, Chen-Kuei Yang, Chin-Chun Chang, Li-Tien Wang, Kuei-Fang Hsiao
Automated Text Detection and Text-Line Construction in Natural Images

This work develops an automated system to detect texts in natural images captured by the cameras embedded on mobile devices. Unlike former researches which focus on detecting with straight texts, this work proposes a text-line construction algorithm which is able to extract curved text-lines in any orientations. An image operator called the Stroke Width Transform is adopted to exploit connected components which have stroke-like properties. Text components are classified into two types: active and passive. The links of active components are considered the initial orientation of text-lines. Complete text-lines are constructed by linking active and passive components. The system is implemented on the Android platform and the experimental results demonstrate the feasibility and validity of the proposed system.

Chih-Chang Yu, Ying-Nong Chen, Wang-Hsin Hsu, Thomas C. Chuang

Science, Technology and Society

Frontmatter
Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement

A remote user authentication scheme is a method to confirm the identity of a remote individual login to the server over an untrusted, public network. In 2012, Wen-Li proposed a dynamic ID-based user authentication scheme with key agreement and claimed that their scheme resisted impersonation attack and avoided leakage of partial information However, we find out that Wen-Li’s scheme could leak some key information to an adversary and is exposed to man in the middle attack launched by any adversary. In this paper we conduct detailed analysis of flaws in Wen-Li’s scheme.

Mijin Kim, Namje Park, Dongho Won
Development and Application of STEAM Teaching Model Based on the Rube Goldberg’s Invention

STEAM is an acronym of Science, Technology, Engineering, Arts, and Mathematics. Rube Goldberg’s Invention requires various inputs and efforts ranging from scientific knowledge, mathematical reasoning, engineering design, to ability for technical operation. It can be an ideal activity for STEAM education that stands for science, technology, engineering, art and mathematics. In this regard, the study identified elements of Rube Goldberg’s Invention that could be applied to STEAM education.

Yilip Kim, Namje Park
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System

Vessel Traffic System (VTS) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (Inter-VTS Data Exchange Format) for Inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA) does not include any highly trusted certification technology for the connectors. However, the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this study suggests the certification system to increase the security of the VTS systems using the main certification server and IVEF.

Namje Park, Seunghyun Cho, Byung-Doo Kim, Byunggil Lee, Dongho Won
Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks

As wireless sensor networks (WSN) continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is important that these security concerns be addressed from the beginning of the system design. So WSN requires main security goal of authenticating among a remote individual, the sensor nodes, and the gateway node. In 2011, Tan proposed a two-factor user authentication scheme suited for WSN environments, in which users can be authenticated using a single password shared with the gateway node. A fundamental requirement for password-based authentication is security against off-line password guessing attack. However, Tan’s scheme does not meet the requirement. In this work, we demonstrate this security problem with Tan’s user authentication scheme.

Youngsook Lee, Jeeyeon Kim, Dongho Won
Design of Mobile NFC Extension Protocol for Various Ubiquitous Sensor Network Environments

The mobile RFID related technologies that offer similar services as NFC were also analyzed to understand the potential linkage to NFC and the requirements for the linkage. To apply the linking method of two technologies suggested in this paper, the dual tag development with marketability and NDEF decoder development as well as additional technology development, standardization, and patents of related technologies are required. Based on these efforts, if the mobile RFID and NFC technologies are linked, the companies can use the existing infrastructures to reduce the initial technological costs.

Jun Wook Lee, Hyochan Bang, Namje Park
Experimentation and Validation of Web Application’s Vulnerability Using Security Testing Method

The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic analysis. We also present a process to improve the security of web applications by mitigating many of the vulnerabilities revealed in the testing phase, and address a new method for detecting unknown vulnerabilities by applying dynamic black-box testing based on a fuzzing technique. The fuzzing technique includes a structured fuzzing strategy that considers the input data format as well as misuse case generation to enhance the detection rate compared to general fuzzing techniques. To verify the proposed approaches, we conducted an experiment using an open source web application (BugTrack) and web application server (JEUS 6). The experiment results show that our testing technique found 142 vulnerabilities of which we were able to remove or mitigate 138 by employing the principles of secure coding. These results imply that our proposed approaches are effective at detecting and mitigating vulnerabilities of web applications.

Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won
Teaching–Learning Methodology of STS Based on Computer and CAI in Information Science Education

Application of STS approach at school can have quite a few benefits. STS(Science Technology in Society) emphasizes interaction between science and technology, impact of scientific and technological advancement on a society, and vice versa. Social issues usually have interdisciplinary elements, and form a complex system. Further, STS can reveal real-life aspect of science, as it addresses scientific facts and technologies that have a direct bearing upon the society.

Juyeon Hong, Namje Park
Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service Era

Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small scale static (as opposed to streaming) data, are inadequate. In this paper, we proposed Bucket ID Transformation that is a new encryption mechanism and the scheme can range search without order-preserving. Bucket ID Transformation is performed by recursive HMAC as many as a value of Bucket ID. As a future desk, we plan to carry out simulated experiments for performance evaluation and compare the results, and design and verify a provably secure encryption mechanism.

Jun Wook Lee, Namje Park

New Technology Convergence, Cloud, Culture and Art

Frontmatter
A Congested Route Discrimination Scheme Through the Analysis of Moving Object Trajectories

In this paper, we propose a congested route discrimination scheme through the analysis of moving object trajectories in road networks. The proposed scheme divides the road into segments with different lanes and length. And then, it extracts congested road segments based on the moving speeds of moving objects and a saturation degree of each road segment. By doing so, we perform clustering method to find congested routes of the road network. Our experimental results show that our proposed scheme derives the directional congested routes through the clustering of the congested segments.

He Li, Hyuk Park, Yonghun Park, Kyoungsoo Bok, Jaesoo Yoo
An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor Networks

In wireless sensor networks, an energy efficient data gathering scheme is one of core technologies to process a query. The cluster-based data gathering methods minimize the energy consumption of sensor nodes by maximizing the efficiency of data aggregation. However, since the existing clustering methods consider only uniform network environments, they are not suitable for the real world applications that sensor nodes can be distributed unevenly. Recently, a balanced multi-hop clustering method in non-uniform wireless sensor networks was proposed. The proposed scheme constructs a cluster based on the logical distance to the cluster head using a min-distance hop count. But this scheme also increases the occurrence of orphan nodes in case of expanding a cluster in large sensor network environments. To solve such a problem, we propose a hierarchical multi-hop clustering scheme that considers the scalability of a cluster in non-uniform large wireless sensor network environments. Our proposed scheme can decrease the number of orphan nodes and has sufficient scalability because our scheme selects member nodes by dividing an angle range in the regular hop count based on min-distance hop count. It is shown through performance evaluation that the orphan nodes of the proposed scheme decrease about 41 % on average over those of the existing methods.

Chunghui Lee, Eunju Kim, Junho Park, Dongook Seong, Jaesoo Yoo
An Energy-Efficient Data Compression and Transmission Scheme in Wireless Multimedia Sensor Networks

In recent years, the demand of multimedia data in wireless sensor networks has been significantly increased for the environment monitoring applications that utilize sensor nodes to collect multimedia data such as sound and video. However, the amount of multimedia data is very large. Therefore, if the data transmission schemes in traditional wireless sensor networks are applied in wireless multimedia sensor networks, the network lifetime is significantly reduced due to excessive energy consumption on particular nodes. In this paper, we propose a novel energy-efficient data compression scheme for multimedia data transmission in wireless sensor networks. The proposed scheme compresses and splits the multimedia data using the Chinese Remainder Theorem (CRT) and transmits the bit-pattern packets of the remainder to the base station. As a result, it can reduce the amount of the transmitted multimedia data. To show the superiority of our proposed scheme, we compare it with the existing scheme. Our experimental results show that our proposed scheme reduces about 71 % in the amount of transmitted data and increases about 188 % in the ratio of surviving nodes over the existing scheme on average.

Junho Park, Dong-ook Seong, Byung-yup Lee, Jaesoo Yoo
A Sensor Positioning Scheme in Irregular Wireless Sensor Networks

In wireless sensor networks, the positions of sensor nodes are very important for many applications. If each sensor node provides information with less positioning error, the positioning information will be reliable. One of the most representative positioning schemes, called DV-HOP is low for positioning accuracy in irregular network environments. Moreover, because it requires many anchor nodes for high accuracy, it is expensive to construct the network. To overcome such problems, we propose a novel sensor positioning scheme in irregular wireless sensor networks. By doing so, the proposed scheme ensures the high accuracy of sensor positioning in non-uniform networks. To show the superiority of our proposed scheme, we compare it with the existing scheme. Our experimental results show that our proposed scheme improves about 36 % sensor positioning accuracy over the existing scheme on average even in irregular sensor networks.

Hyuk Park, Donggyo Hwang, Junho Park, Dong-ook Seong, Jaesoo Yoo
Secure Multipath Routing for WMSN

In recent years, the requirements on the high quality environment monitoring by using the sensor nodes which can handle the multimedia data in WSN have been increased. However, because the volume of multimedia data is tremendous, the limited bandwidth of a wireless channel may incur the bottleneck of a system. To solve such a problem, most of the existing distributed multi-path routing protocols based on multimedia data just focused on overcoming the limited bandwidth in order to enhance the energy efficiency and the transmission rate. However, because the existing methods can not apply a key-based technique to the encryption for the multimedia data, they are very weak for aspects of the security. In this paper, we propose a secure disjointed multipath routing scheme for multimedia data transmission. Since our proposal scheme divides multimedia data (e.g. image) into pixels and send them through disjointed multipath routing, it can provide security to the whole network without using the key-based method. Our experimental results show that our proposed scheme reduces about 10 % the amount of the energy consumption and about 65 % the amount of the missed data packets caused by malicious nodes over the existing scheme on average.

Sangkyu Lee, Junho Park, Dongook Seong, Jaesoo Yoo
Dynamic TDMA Scheduling for Data Compression in Wireless Sensor Networks

In this paper, we propose a novel compression approach using a dynamic TDMA scheduling. While the existing approaches exploit spatio-temporal correlation to suppress sensor readings, our approach tries to hide sensor readings into the TDMA schedule. The TDMA schedule consists of multiple frames that have been assigned with prefix symbols. Sensor nodes select their corresponding frames and transmit encoded symbols instead of raw sensor readings to the base station. Our scheme achieves the data compression, and occurs the latency in the range.

Myungho Yeo, Jaesoo Yoo
A Study of Forest Fire Correlation to Based on Meteorological Factors

The forest fires that occur each year many lives, property, and ecosystems are destroyed. Approximately 64 % of the land, especially the Korea is forest. If you cause damage to large forest fires, it takes longer to repair the damage. Various studies to understand these forest fires process, but research related to forest fires and meteorological factors is lacking. In this paper, we use the correlation coefficient with forest fires and meteorological factors were investigated for the association. The result may be associated with forest fires and meteorological factors were confirmed.

Young-Suk Chung, Jin-Mook Kim, Koo-Rock Park
A Study on the Improvement of Interoperability in Rok C4I System for Future Warfare

The basic idea of Network Centric Warfare (NCW) is that data processing capabilities of computers and communication technologies of a network can be leveraged to guarantee information sharing, which will increase the efficiency of running a military. Amid advancements being made in IT, the Korea military is one of the militaries in the world doing research on ways of conducting more effective warfare, which it aims to achieve by connecting each of the entities together and sharing battlefield resources. However, maintaining interoperability between different systems is an issue, caused by the fact that different militaries have different tactics and weapon systems. In this paper, the current state of interoperability is examined, for when the Korean military builds a C4I system in preparation for future warfare. Furthermore, interoperability cases in the US are analyzed, and matters of consideration and various technologies for interoperability are proposed.

Hyun-Jeong Cha, Jin-Mook Kim, Hwang-Bin Ryou, Hwa-Young Jeong
Development Direction for Information Security in Network-Centric Warfare

As IT advances, warfare undergoing a paradigm shifts. It is going from a type that is weapon-based—making heavy use of conventional weapons—to one that is network-based, a type of warfare called network-centric warfare (NCW). In NCW, sharing of information can be guaranteed using communication technologies of the network. As the members that take part in missions can exchange and collaborate with other, they can be completed more successfully and efficiently, increasing the military might. Amid advancements being made in IT, the Korea military is also doing research for conducting more effective warfare, which it aims to do by connecting each of the entities together and sharing battlefield resources. This paper examines threats to information security in NCW, as well as requirements for information security. Furthermore, a development direction for information security is proposed.

Ho-Kyung Yang, Jin-Mook Kim, Hwang-Bin Ryou, Jong-Hyuk Park

Smart Grid Security and Communications

Frontmatter
An IHD Authentication Protocol in Smart Grid

Recently, the security of Smart Grid has become an important issue. There are many security issues which should be addressed. With that, many previous studies have discussed these issues. However, most of them focus on the overall Smart Grid system rather than the Home Network Area (HAN) in Advanced Metering Infrastructure (AMI) network. The HAN has become a critical issue of Smart Grid due to save energy and to reduce energy peak loading. In-Home Display (IHD) is a useful device in the HAN. Therefore, in this paper, we design a secure authentication protocol between IHD and Head End. The protocol is compatible with IEC 62056-53 which is a Smart Grid standard. Furthermore, the proposed authentication is the first protocol which takes the relationship between landlord and tenant into account. We leverage a cellphone to accomplish this purpose. In this paper, the security analysis of the proposed protocol is also given.

Ming-Yu Hsu, Yao-Hsin Chen, Shiang-Shong Chen, Wenshiang Tang, Hung-Min Sun, Bo-Chao Cheng
Flexible Network Design for Wide Area Measurement Protection and Control

A Wide Area Measurement, Protection and Control (WAMPAC) strategy yields great potential for the upgrade of the supervision, operation, protection and control of modern power systems. A flexible, scalable network infrastructure is the key to enabling these enhanced functionalities. Information exchange among distributed synchrophasors in a national area requires a wide ranging capability for the acquisition and exchange of data. Although those phasor measurements are synchronized by the Global Positioning System (GPS), any time delay in monitoring and control services are damaging especially under fault conditions. The paper summarizes the communication needs of a range of advanced applications within the WAMPAC methodology. Network architectures capable of supporting the requirements of advanced power system control strategies are proposed. The performance of a number of candidate communication systems are analyzed through simulation using the deployed power system topology in United Kingdom as the basis.

Di Cao, Adam Dysko, Craig Michie, Ivan Andonovic
Green Communication and Corporate Sustainability of Computer Aided Audit Techniques and Fraud Detection

Fraud is prevalent in society and is increasing considerably over in recent years. Auditors have been criticized severally because they tend to reach conclusion based upon inadequate audit processes, and hence, the validity of the audit conclusion has often been questioned. This study thus sought to identify the various types of fraud encountered during financial transactions, evaluate the adoption of Computer Aided Audit Tools (CAATs) in fraud detection in an organization, appraise the impact of CAATs on performance of an organization, and ascertain the problems of CAATs’ application within an organization. Data for the study was collected using a well-structured questionnaire which was distributed among 250 employees of an auditing company. The data were analysed using descriptive statistics and SPSS package, and the hypothesis of the study was analysed using regression analysis. The findings of the study showed that 72.8 % of the respondents agreed that CAATs have played a major role in fraud detection, and hence can be used to curb fraud to a minimal level in organisations. It was also discovered that CAAT helped to improve the auditors’ performance as corroborated by 58.1 % of the respondents. However, quiet a handful of respondents (23.0 %) were undecided in this respect as they claimed that the improved performance has been associated with much stress and pressure. Furthermore, the cost of implementing CAAT, the required skills to be acquired for its usage, and systems database requirements, were some of the problems found to be associated with the application of CAAT in organisations.

Ezendu Ariwa, Omoneye O. Olasanmi, Jaime Lloret Mauri
Green Communication and Consumer Electronics Sustainability in Delivering Cost Benefit Business Federation in Professional Service Firms

We present the business federation as a new organizational form using insights from business literature as means to tailor make services to clearly defined market segments. We illustrate how professional service firms can achieve economic growth through operating locally within an international network. Within the business federation local offices gain access to resources through an extreme form of delegation as it is not top management that delegates to local offices but rather local units that give top management the permission to handle certain tasks because it is most efficient this way. With these new realities existing strategies do not seem to provide the necessary cure. Firms must constantly innovate using insights from new organizational models.

Ezendu Ariwa, Carsten Martin Syvertsen, Jaime Lloret Mauri
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory

A smart grid is verging on a promising technology for reforming global electrical grids. Currently, attackers compromise security and privacy by maliciously modifying the memory of smart grid devices. To thwart such attacks, software-based attestation protocols ensure the absence of malicious changes. A verifier and a target device locally generate their own checksums by memory traversal, and the verifier attests the target device by comparing the checksums. For smart grids, however, two challenges are arise in practically deploying the attestation protocol: verification overhead for large-scale networks and evasion of attestation by memory replication. To address these challenges, we propose a novel software-based attestation technique, termed SMATT (Smart Meter ATTestation), to address the aforementioned two challenges by leveraging multiple target selection and copy-proof memory. A verifier randomly selects multiple smart meters, and receives checksums. The verifier only compares the checksums instead of performing memory traversal, thereby remarkably reducing the computational overhead. To prevent memory replication, we design a customized copy-proof memory mechanism. The smart meter outputs garbage values when copy-proof memory sections are being accessed, and thus, attackers cannot replicate the memory. Furthermore, we define an SI epidemic model considering two attestation parameters, the number of infectious smart meters and the number of selected smart meters by a verifier, to enhance the malware detection accuracy of SMATT. In our experimental environments, SMATT takes only 20 s for a verifier to attest millions of smart meters. In addition, SMATT detects malware with over 90 % probability, when the malware tampers with 5 % of the memory.

Haemin Park, Dongwon Seo, Heejo Lee, Adrian Perrig

Computer Convergence

Frontmatter
Design of a Structured Plug-in Smart Education System

With a recent emergence and growing interest in smart education and rapid growth of the related market, we established Structured Plug-in Smart Education System for effective smart education, based on the concept of smart education, research, and technology. This system consists of a Smart Contents Service System that links learning contents to producing, managing, and learning, as well as a School and Home Learning System that supports cooperating, intellectual, and life-long learning by creating learning spaces in school and home, and effective learning correlation. In order to realize this system for smart education, we plan to verify the effectiveness of the Structured Plug-in Smart Education System by applying this system to formal education and analyzing its effectiveness.

Jaechoon Jo, Youngwook Yang, Heuiseok Lim
Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area Network

In the real scenarios, network utilization widely depends on the background traffic and the number of active users. This paper presents the effect of background traffic on the QoS of foreground traffic by varying the utilization of LAN devices, server, and bandwidth. We designed a WAN (Wide Area Network) using the OPNET simulator, which consists of different Local Area Networks (LANs) located in different cities. We considered a foreground GSM quality voice traffic, and FTP heavy and video conference background traffic. The experimental results demonstrated that the channel bandwidth utilization has much effect on the QoS of foreground traffic. In addition, heavy background traffic highly affects the QoS of foreground traffic due to the network congestion.

Jia Uddin, Jong Myon Kim
Load Balancing in Grid Computing Using AI Techniques

Work load and resource management are two important factors that have to manage across the grid environment. To increase the overall efficiency of grid based infrastructure the work load across the grid environment has to manage. Hence the work load must be evenly scheduled across the grid nodes so that grid resources can be properly exploited. The technique that we have investigated in this paper is based upon the combination of genetic algorithms which is an evolutionary algorithm and artificial neural networks. Both of these techniques are applied for local grid load balancing. Genetic algorithm selects the optimal set of jobs for assigning to the grid nodes which overall minimizes the total execution time. Afterwards when optimal set of jobs is selected they are assigned to artificial neural network which selects the minimum loaded grid processor for further processing of this optimal set of jobs. We compare our proposed technique with the already existing strategies for load balancing like random algorithm, round robin algorithm, decreasing time algorithm and least connection algorithm. Results shows that our strategy gives optimal results in terms of overall time efficiency. So we can overall conclude that GA’s and ANN’s increase overall efficiency of job scheduling especially in case where the tasks coming for scheduling and processing nodes are continuously increasing.

Nadra Tabassam Inam, M. Daud Awan, Syed Shahid Afzal
LiQR: A QR Code-Based Smart Phone Application Supporting Digital Marketing

A Facebook Page is considered as an essential place for businesses to build connections with people. The page is often used for building up relations with Facebook users through a function called ‘Like’. In this paper, we propose a method supporting digital marketing based on Facebook pages and QR code, presenting a smart phone application developed using the proposed method. The developed application named LiQR provides a function transforming the information of a Facebook page into a corresponding QR code. When a user takes a picture of the printed QR codes with the smartphone camera, the application enables the user to support the Facebook page with the same effect as clicking the ‘Like’ button, providing functions useful for managing the information on the Facebook page.

Jong-Eun Park, Jongmoon Park, Myung-Joon Lee
Ensuring Minimal Communication Overhead in Low Bandwidth Network File

All wireless networks are resource constrained, the battery power, memory and bandwidth are main constraints along with security of information in wireless networks. Running of ordinary file systems on such wireless networks can result in short battery life and bandwidth dilemma for large file sharing, which results in high latency and unbearable delays which user do not consider while working on wireless networks, also the security is second main issue in wireless networks as any false node can inject his packet or private information can be divulged to someone who is not intended, so there is paramount need of an efficient and secure file system for wireless networks. The paper describes the need of secure and bandwidth efficient file system for wireless networks and also proposes a file system which is secure and bandwidth efficient and can become a part and parcel of wireless networks. Simulation results are evident of the performance achieved for our proposed scheme. Proposed methodology can save maximum bandwidth by taking advantage of cross file commonalities, in best case analysis it will just transmit a packet containing just hash tree.

Muhammad Ahsan Habib, Waqas Nasar, Shehzad Ashraf Ch, Ahsan Jamal Khan
Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc Networks

Wireless ad hoc networks become more and more popular and significant in many fields. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, such as blackhole attacks. In this paper, we proposed a scheme to prevent blackhole attacks in wireless ad hoc networks. Our scheme consists of three mechanisms which are trust management mechanism, detection mechanism and location mechanism. The performance simulation analysis confirms the availability and efficiency of our scheme.

Fei Shi, Weijie Liu, Dongxu Jin
Fundamental Tradeoffs for Ubiquitous Wireless Service: A QoE, Energy and Spectral Perspective

Recent advances in computing and communication technologies enable the popularity of versatile mobile devices, which accounts for a substantial amount of energy use. The energy consumption has become of unprecedented importance, particularly in a cloud computing systems which provide ubiquitous services. Conventional designs of wireless networks mainly focus on spectral efficiency (SE) enhancing. Given the variety of media services in the cloud environment, a green computing network, which meets the quality of experience (QoE) requirements for users and also improves energy efficiency (EE), is the most appropriate solution. In this paper, we first propose the unit QoE per Watt, which is termed QoE efficiency (QEE), as a user-oriented metric to evaluate EE. Then, we investigate the fundamental tradeoffs between QEE and SE for typical ubiquitous services. Our analytical results are helpful for network design and optimization to access a flexible and desirable tradeoff between the QoE and energy conservation.

Yueying Zhang, Fei Liu, Yuexing Peng, Hang Long, Wenbo Wang
Multi-Policy Collaborative Access Control Model for Composite Services

Service composition has become the main style of cross-domain business collaboration environments, and security issues prohibit the widespread use of composite services. Based on attribute, this paper presents a multiple policies collaborative access control model which combines the attribute policies of composite service, component services and user domain. This model can provide fine-grained access control for service composition and support collaborative authorization based on business attributes in business collaboration environments while keeping the standalone of component service access control. The analysis result shows that this model not only satisfies the access control requirements of business process in composite service, but also provides fine-grained access control for component services.

Bo Yu, Lin Yang, Yongjun Wang, Bofeng Zhang, Linru Ma, Yuan Cao
Backmatter
Metadaten
Titel
Computer Science and its Applications
herausgegeben von
Sang-Soo Yeo
Yi Pan
Yang Sun Lee
Hang Bae Chang
Copyright-Jahr
2012
Verlag
Springer Netherlands
Electronic ISBN
978-94-007-5699-1
Print ISBN
978-94-007-5698-4
DOI
https://doi.org/10.1007/978-94-007-5699-1