skip to main content
10.1145/2857546acmconferencesBook PagePublication PagesicuimcConference Proceedingsconference-collections
IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication Danang Viet Nam January 4 - 6, 2016
ISBN:
978-1-4503-4142-4
Published:
04 January 2016
Sponsors:
SIGAPP, SKKU

Bibliometrics
research-article
Electronic Door Access Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-based Face Recognition using Principal Component Analysis

By implementing authentication, it can ensure that system's resources are not obtained fraudulently by illegitimate users. Currently, most commonly used for door access controls is single-factor authentication (SFA). Problem arises when SFA is not able ...

research-article
A Framework of Information Technology Supported Intelligent Learning Environment

Information technology has been not only changing the industrial production/management processes and social coordination/cooperation mechanisms, but also giving drastic impacts to even our human activities. Of course, such phenomena are observed ...

research-article
A Novel Approach for Reducing HSR Unicast Traffic Using Pre-defined Dual Paths

High-availability seamless redundancy (HSR) is a redundancy protocol for Ethernet networks that provides zero recoery time in case of a network failure. The feature of HSR makes it suited for time-critical and mission-critical applications, such as ...

research-article
An efficient geometric shape coding and representation approach to obtain both skeleton and contours

We present a novel approach to the coding and representation of shapes using intersections. Our algorithm combines contour and region based approaches. After exploring hitherto unvisited regions of the shape, we find salient features on the boundary in ...

research-article
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection

Cloud computing has emerged as a fast-growing technology in the past few years. It provides a great flexibility for storing, sharing and delivering data over the Internet without investing on new technology or resources. In spite of the development and ...

research-article
A Hybrid Scheme for Face Template Protection

This paper proposes a hybrid scheme which combines modified shielding function with a one-way transformation technique known as matrix transformation. The modified shielding function is an improved version of the generic shielding function which ...

research-article
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments

In multi-server environments, remote user authentication is an extremely important issue because it provides authorization while users access their data and services. Moreover, the remote user authentication scheme for multi-server environment has ...

research-article
HTML and PDF fuzzing methodology in iOS

iOS is well-known operating system which is strong in security. However, many attacking methods of iOS have recently been published which are called "Masque Attack", "Null Dereference" and "Italy Hacking Team's RCS". Therefore, security and safety is ...

research-article
Covering the Plane with Equal Sectors

In the regular covers, a region in the plane is split into the equal regular polygons (tiles), and all the tiles are covered equally with some geometric figures. In this paper, a tile is an equilateral triangle. We proposed and analyzed the regular ...

research-article
Reduction of Wake-up Time for Partial Networking in Automotive System

Vehicle manufacturers have been conducting continuous research on energy conservation and efficient energy management of vehicles in accordance with the increased power consumption due to increasing fuel consumption and increasing number of high ...

research-article
A new approach to measure the utilizable bandwidth

In this work, we study the problem of measuring the achievable bandwidth -- maximum throughput that a flow between two hosts can achieve in the presence of cross-traffic. We use analysis and experiments to show that the achievable bandwidth is not the ...

research-article
Standard based Personal Mobile Health Record System

Major paradigm shift in healthcare industry was done when ONC announced meaningful use (MU) on the electronic health record (EHR) systems, namely from clinician-centered to patient-centered. The shift is based on some major concepts such as ...

research-article
Robust Features for Trustable Aggregation of Online Ratings

When purchasing an online product, customers tend to be influenced strongly by its reputation, the aggregation of customers' ratings on the product. The reputation, however, is not always trustable since it can be easily manipulated by attackers. In ...

research-article
Energy-efficient topology construction for multi-attribute data gathering in WSNs

Environmental monitoring is a crucial application of wireless sensor networks (WSNs). This kind of application generally requires a certain geographical granularity of sensing. In addition, some applications simultaneously gathers sensor readings with ...

research-article
Identification of In-Home Appliances through Analysis of Current Consumption

Non-intrusive load monitoring (NILM) has been being the method to estimate and disaggregate information about the power consumption of individual electric appliances in a building or home by aggregate measurements of voltage and current. The power ...

research-article
The Hybrid Approaches for Forecasting Real Time Multi-step-ahead Boiler Efficiency

We study how to optimize the boiler efficiency of a steam boiler which is the most important component in a fertilizer plant. In particular, we have proposed several methods for forecasting when the trend of the boiler efficiency is going down so that ...

research-article
A syllable-based method for Vietnamese text compression

Text compression is a technique to reduce the size of text file and increase the transfer rate as well as save storage space. Many approaches have been proposed to tackle this problem in several languages such as: English, Chinese, Turkey, Japanese, ...

research-article
A Novel Authentication Protocol for Micropayment with Wearable Devices

Wearable devices show rapid market growth in the last five years. General application areas include fitness trackers, watches, glasses, smart clothing, and healthcare. Recently, it becomes a hot topic for people to adopt wearable devices as a tool to ...

short-paper
Developing a Model for Continuous User Engagement in Social Media

In this paper, we propose a new model for continuous user engagement in social media. Since social media appeared, it has been transformed into a media platform. Accordingly, there is also a change on the way that social media gathers people likewise ...

research-article
Evaluating Semantic Relatedness Between Concepts

In this paper, we systematically investigate the methods of measuring semantic relatedness between concepts and categorize them into 6 types of methods: path based, information content, gloss based, vector based, corpus based and string based. Besides, ...

research-article
A Linked Data Driven Semantic Model for Interpreting English Queries in Question Answering System

This paper introduces the Linked Data Driven Semantic Model for Interpreting English Queries (SMIQ) which is proposed to interpret the semantics of English queries used in our linked data based question answering system. SMIQ models the meanings of ...

research-article
Joint Vertical Handoff and Resource Allocation in OFDMA/TDD Systems based on Software-Defined Wireless Network

One considerable challenge in future heterogeneous wireless networks (HetNet) is vertical handover. Current vertical handover approaches almost focus on resolving two questions: (1) when a Mobile Station (MS) needs to carry out a vertical handover (VHO) ...

research-article
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function

Remote user authentication schemes are commonly used for communication between authorized users and remote servers over an insecure network. Due to its simplicity and convenience this method is widely used in many environments, such as sensor networks ...

research-article
The Development of Hardware Architecture for Real-time Chain Code based on FPGA

This paper presents a hardware architecture developed for use with real-time Chain Code. This system applies open-chain code and closed-chain code to solve some problems related to noise and an inexact edge image. The design of the proposed method uses ...

research-article
The Development of the Hardware Architecture to Perform Template Matching using Distance Transform

This paper presents the hardware architecture and template matching using distance transform. In the proposed method, the extracted Canny edge image is used as a template for matching processing. The distance images are transformed from the Canny edge ...

research-article
Performance Analyses of Duplicated I/O Stack in Virtualization Environment

Recently, many studies have focused on eliminating duplicated I/O stack of virtualization because I/O requests of a guest machine have to pass through the I/O stack of both the guest and host machine. In this paper, we analyze the effect of duplicated I/...

research-article
Monitoring Dynamic Modification of Routing Information in OpenFlow Networks

Network routing information can be dynamically modified with ease using software-defined networking (SDN). However, it is not possible to simultaneously change the routing information in all the switches in a network. Thus, there must exist a short ...

research-article
A Buffer Cache Algorithm Using the Characteristic of Mobile Applications based on Hybrid Memory Architecture

In general, current mobile devices employ a buffer cache mechanism which has been designed to mitigate the performance gap between CPU and storage. However, it cannot fit in mobile devices because it does not consider the characteristics of the mobile ...

short-paper
A Monitoring System in Real Time based on Android Platform

This paper proposes a smartphone application for monitoring and measuring the energy usage in real time with wireless communication. The goal of paper is aimed to develop a utility application run on the Android platform as mobile interaction system to ...

research-article
Automated Content Analysis: A Sentiment Analysis on Malaysian Government Social Media

Social media has become the current trend in information technology industry that acts as the collective of online communication channels for community-based input, interaction, content-sharing and collaboration, used all around the world. Microblogging ...

Recommendations

Acceptance Rates

Overall Acceptance Rate213of621submissions,34%
YearSubmittedAcceptedRate
IMCOM '1825510039%
IMCOM '1736611331%
Overall62121334%