Skip to main content

About this book

This two-volume-set constitutes the refereed proceedings of the 6th International Conference on Future Information Technology, FutureTech 2011, held in Crete, Greece, in June 2011. The 123 revised full papers presented in both volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on future information technology, IT service and cloud computing; social computing, network, and services; forensics for future generation communication environments; intelligent transportation systems and applications; multimedia and semantic technologies; information science and technology.

Table of Contents


Social Computing, Network, and Services

A User Supporting Personal Video Recorder Based on a Generic Bayesian Classifier and Social Network Recommendations

The handling of the enormous offer of TV content is a challenge for every TV user since the number of receivable channels highly increased in recent years. Regular TV guides or newspapers present just a limited number of channel timetables and the user won’t spend additional time to discover the rest of timetables by using other media e.g. the Internet. Hence, the user only focuses on favored channels and interesting content on others won’t be recognized. The result is that the user might not select the most appropriate content regarding his or her interests. Assistive systems and tools are desirable to counteract this problem. We extend a Personal Video Recorder (PVR) with a recommendation system based on a Bayesian classifier and a collaborative approach using social networks like Facebook or Twitter. In case of the Bayesian classifier, the system is analyzing the user’s watching behavior to generate personalized TV program recommendations. With the social network component the user receives recommendations from acquaintances and friends. The recommendations are automatically stored on the system’s internal hard disc drive for the user to watch. This paper presents the current state of development by introducing the system’s architecture and implemented recommendation mechanisms.

Benedikt Engelbert, Malte Blanken, Ralf Kruthoff-Brüwer, Karsten Morisse

Local Community Finding Using Synthetic Coordinates

A fundamental problem in social networking and computing is the community finding problem that can be used in a lot of social networks’ applications. In this paper, we propose an algorithm that finds the entire community structure of a network, based on interactions between neighboring nodes (distributed method) and on an unsupervised centralized clustering algorithm. Experimental results and comparisons with another method found in the literature are presented for a variety of benchmark graphs with known community structure, derived by varying a number of graph parameters. The experimental results demonstrate the high performance of the proposed algorithm to detect communities.

Harris Papadakis, Costas Panagiotakis, Paraskevi Fragopoulou

Virtual B-Tree Topology: A Self-Routing Topology for a Wireless Sensor Network

A wireless sensor network consists of many wireless sensor nodes that work together. Since communication between nodes depends on routing protocol, a portion of the required energy is consumed by periodic routing protocol or flooding. This research shows that the routing overhead can be reduced by making a virtual B-Tree topology out of these nodes through utilizing the characteristics of both a wireless network and a B-Tree, and thus the network can perform a self-routing characteristic. As soon as the topology is organized, paths between peers come out, and there is no need to wait to find path. During forwarding packets, the nodes can transmit packets through a better path. The results indicate that 35 unit times are required to organize 100 randomly deployed nodes and do not need periodic routing messages.

Shan-Yang Wang, Tzu-Chiang Chiang, Chu-Sing Yang

A Peer-to-Peer Social Network Overlay for Efficient Information Retrieval and Diffusion

In this paper we explore new ways in P2P based Online Social Network (OSN) design and present a novel methodology for efficient information retrieval and diffusion in OSN. We propose a new P2P topology model that matches real OSN graph. The new topology decreases the graph diameter and thus the route length by rendering the graph power law. Our proposal can be adapted to existing P2P based OSN systems and thus can fit diverse OSN application requirements. We present the architecture of our adaptable overlay network model as well as the proposed search techniques employed to provide efficient data search and information diffusion. Through simulations, we show the effectiveness of our approach in term of search route length and signaling cost.

Salma Ktari, Artur Hecker

Good Friends, Bad News - Affect and Virality in Twitter

The link between affect, defined as the capacity for sentimental arousal on the part of a message, and virality, defined as the probability that it be sent along, is of significant theoretical and practical importance, e.g. for viral marketing. The basic measure of virality in Twitter is the probability of retweet and we are interested in which dimensions of the content of a tweet leads to retweeting. We hypothesize that negative news content is more likely to be retweeted, while for non-news tweets positive sentiments support virality. To test the hypothesis we analyze three corpora: A complete sample of tweets about the COP15 climate summit, a random sample of tweets, and a general text corpus including news. The latter allows us to train a classifier that can distinguish tweets that carry news and non-news information. We present evidence that negative sentiment enhances virality in the news segment, but not in the non-news segment. Our findings may be summarized ‘If you want to be cited: Sweet talk your friends or serve bad news to the public’.

Lars Kai Hansen, Adam Arvidsson, Finn Aarup Nielsen, Elanor Colleoni, Michael Etter

Semantic Verification in an Open Collaboration Scenario

In this paper we describe a framework for imposing constraints in the content of webpages and show its adequacy in open collaborative scenarios such as wikis. This framework is the extension of the XML processing language XCentric with syntactic validation, semantic verification and automatic correction of websites. The highly declarative model of XCentric along with the domain-specific verification techniques enable an agile implementation of constraints over web content.

Jorge Coelho, Mário Florido

Designing Persuasive Third Party Applications for Social Networking Services Based on the 3D-RAB Model

The use of social networks services for promoting business, teaching, learning, persuasion and spread of information continues to attract attention as most social networking services (SNSs) now allow third party applications to operate on their sites. In the field of persuasive technology, the ability of SNSs to build relationships among their users and create momentum and enthusiasm through rapid cycles also give it a greater advantage over other persuasive technology approaches. In this paper we discuss the 3-dimensional relationship between attitude and behavior (3D-RAB) model, and demonstrate how it can be used in designing third-party persuasive applications in SNSs by considering external factors which affects persuasive strategies.

Isaac Wiafe, Keiichi Nakata, Stephen R. Gulliver

A Self-adaptive Clustering Scheme with a Time-Decay Function for Microblogging Text Mining

Online microblogging services such as Twitter allow users to post very short messages related to everything ranging from mundane daily life routines to breaking news events. This phenomenon has changed the way for information acquisition. In this paper, we present an instinctive method with a time-decay function which corresponds to the natural propagation of social networks for clustering real-time text streams collected from Twitter. Compared to most previous studies, we follow natural cascading behaviors of event lifecycle to develop a self-adaptive clustering model for online event detection. Also, we construct an expandable similarity matrix which is capable of evaluating microblogging posts with incomplete semantic features. Experimental results show that the proposed method is a sensible solution to monitoring momentous real-time events and utilizing the text streams to facilitate the management of social networking data.

Chung-Hong Lee, Chih-Hung Wu

Weighted Co-authorship Network Based on Forgetting

In this paper we focus on the analysis of weighted networks and their properties. We describe a new way to weigh network vertices and edges based on the Forgetting curve. We denote the weight as a stability changing gradually over time. Based on the stability, we propose new measures. For our experiments we have selected the DBLP database, therefore we can evaluate our approach on a real network with more than 830,000 vertices.

Milos Kudelka, Zdenek Horak, Vaclav Snasel, Ajith Abraham

Towards Usage-Centered Design Patterns for Social Networking Systems

The role of social networks is becoming increasingly relevant in the recent years. While social networks are becoming more ubiquitous, a profound approach guiding the analysis, design and development of such social systems is becoming increasingly important. This research focuses on deriving functionalities that classify behavior of social networking applications. This led to identifying three basic/elementary usage patterns which include;







, while the intersection between these patterns led to other secondary/supportive usage patterns which include














. By interlinking the proposed patterns of usage with underlying techniques and Web 2.0 tools we aim to provide insight into re-usable elementary building blocks common to any type of social networks. As a result a usage-centered roadmap is presented that identifies the intersection of several Web 2.0 tools and techniques used to realize the three identified social networking patterns of usage.

Dina Hussein, Ghada Alaa, Ahmed Hamad

Ranked Clusterability Model of Dyadic Data in Social Network

The dyads relationship as a substantial portion of triads or larger structure formed a ranked clusterability model in social network. Ranked clusterability model of dyads postulates that the hierarchical clustering process starts from the mutual dyads which occur only within clusters then stop until all of the mutual dyads grouped. The hierarchy process continues to cluster the asymmetric dyads which occur between clusters but at different levels. Then the last process is clustering the null dyads, which is clustered at the end of the hierarchy after all of asymmetric dyads grouped and occur only between clusters at the same level of the hierarchy. This paper explores a ranked clusterability model of dyads from a simple example of social network and represents it to the new sociomatrix that facilitate to view a whole network and presents the result in a dendrogram network data. This model adds a new insight to the development of science in a clustering study of emerging social network.

R. B. Fajriya Hakim, Subanar, Edi Winarko

Forensics for Future Generation Communication Environments

Forensic Analysis of Residual Information in Adobe PDF Files

In recent years, as electronic files include personal records and business activities, these files can be used as important evidences in a digital forensic investigation process. In general, the data that can be verified using its own application programs is largely used in the investigation of document files. However, in the case of the PDF file that has been largely used at the present time, certain data, which include the data before some modifications, exist in electronic document files unintentionally. Because such residual information may present the writing process of a file, it can be usefully used in a forensic viewpoint. This paper introduces why the residual information is stored inside the PDF file and explains a way to extract the information. In addition, we demonstrate the attributes of PDF files can be used to hide data.

Hyunji Chung, Jungheum Park, Sangjin Lee

Digital Quantum Forensics: Challenges and Responses

Recent developments in technology suggest that within the next one to two decades some form(s) of quantum computing device will become viable. Once such devices become generally available they will doubtless be employed by cyber-criminals to perform brute-force decryption tasks that were previously infeasible. This paper attempts to address the question of how digital forensic investigation techniques will need to develop in order to respond to the challenges posed by such future generation computing devices.

Richard E. Overill

Recovery Techniques for Deleted Email Items in Digital Forensic Context

Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.

Chorong Jeong, Keun-gi Lee, Sangjin Lee

Digital Evidence Discovery and Knowledge Management Issues Concerning Multimedia Computing Devices Utilizing GPS Navigation Services and Social Network Activities

Mobile communication devices are commonly adopted in contemporary Internet Communication Technology (ICT) era with unparalleled evolving pace. Regrettably, ICT related cybercrimes are rising in an unprecedented speed. Unquestionably, the detection and prevention of the associate information security incidents becomes much more urgent and unarguable both in public sectors as well as private sectors. In this paper, the utilization of a PDA for GPS navigation and Wi-Fi connection to ubiquitous social networking service provider – Facebook are cross examined concerning the related digital evidence collecting and discovering concerning ubiquitous networks and wireless communications, which provides a framework for the associate digital forensics.

Hai-Cheng Chu, K. H. Chang, Yi-Da Wang, Jong Hyuk Park

Website Risk Assessment System for Anti-Phishing

Phishing attacks steal a user’s identity data and financial account credentials using social engineering and technical spoofing techniques. Many counter measures have been developed to protect user’s sensitive information from phishing attacks. Although most approaches use both website black lists (WBLs) and website white lists (WWLs), these approaches have several weakneksses. This paper presents a novel anti-phishing Website Risk Assessment System (WRAS). WRAS computes a security risk index of website and generates warnings as to the website trustworthiness. Therefore, it can protect inexperienced users against spoofed website-based phishing attacks and exploit-based phishing attempts that may occur from legitimate web pages.

Young-Gab Kim, Sungdeok Cha

Intelligent Transportation Systems and Applications

Delivering Real-Time Bus Tracking Information on Mobile Devices

The recent technological advances in mobile communication, computing and geo-positioning technologies have made real-time transit vehicle information systems an interesting application area. In this paper we present a transit application system which displays the transit information on an OpenStreetMap (OSM) web interface and delivers this information on the Google Android mobile device. The content is in the form of predicted arrival/departure times for buses at user-selectable geographic locations within a transit region. This application uses the real-time information such as current location and timestamp of both bus and users to provide bus route information. The public interface provides a graphical view which used to display and updates the vehicle locations and to allow users to see routes, stops and moving buses. The mobile device provides the user with the expected arrival/departure time of the next bus at the bus stop based on the user’s current position.

Bashir Shalaik, Adam Winstanley

Camel-Vehicle Accidents Mitigation System: Design and Survey

Animal-vehicle collisions (


) affect human safety, property and wildlife. Furthermore, the number of collisions with large animals worldwide and especially in the Saudi Arabia Kingdom has increased substantially over the last decades. The negative effects of


and the increase in collisions prompted the initiation for designing a deployable and intelligent

Camel-Vehicle Accident Avoidance System

(CVAAS) using

global positioning system

(GPS) technology.


can be classified as an Intelligent Transportation System (


). The use of GPS technology in this kind of application is a

novel idea

. This article provides a detailed discussion in there related literature review. Moreover, it discusses the high-level design of the



Khaled Ragab, Mohammed Zahrani, Asrar Ul Haque

A Hierarchical Architecture for Semantic Sensing Information Representation

Wireless sensor networks are used in various applications in several domains for measuring and determining physical phenomena and natural events. Wireless sensor networks can support to observe characteristics of physical objects and features of natural incidents. This paper proposes a hierarchical architecture of semantic information for heterogeneous sensor data representation in vehicle. This architecture includes 5 layers which have a physical layer, an event layer, a semantic layer, an awareness layer, and service layer. This architecture provides various real-time sensing data such as velocity, acceleration, temperature and steering wheel position in vehicles. Information of this architecture supports to detect sudden unexpected events such as accidents on the vehicle environment. We develop ontology description for sensor data and use the Protégé for processing which includes querying and inference over sensor data.

Rajani Reddy Gorrepati, Hyeon Park, Dong-Hwan Park, Do-Hyeun Kim

An Integrated Process Method of Sensing Data for Multi-sensor Networks

Recently, SWE (Sensor Web Enablement) working group of OGC (Open General Consortium) is carrying out a research on providing real-time sensor data and video collected in sensor networks through the Internet Web. However, the research does not deal with mobile objects such as cars, trains, ships, and persons. Therefore, we present an integrated processing method of video, sensor data, and location information collected in mobile sensing nodes for tracking and surveillance of mobile objects. The proposed method integrates and processes heterogeneous data from GPS devices, sensor networks, and video devices. Based on the proposed method, we designed and implemented a combine adaptor which receives the context data through a common interface and creates combined messages after parsing and queuing the data. We verified the proposed method works well with our integrated adaptor. The proposed method is expected to be helpful to develop various tracking and surveillance based on location.

Jun-Pil Boo, Do-Hyeun Kim, Hee-Dong Park, Paul Roe

Multimedia and Semantic Technologies

Relevance Feedback for Surveillance Video Retrieval at Object Level

Object retrieval plays more and more important role as the number of video surveillance systems and the amount of stored data drastically increase. We address in this paper the specific part of retrieving objects of interest within surveillance video sequences problem: relevance feedback. In order to allow users to interact with retrieval system, we propose two relevance feedback methods at object level. These methods take into account appearance as well as temporal aspects of moving objects in surveillance video sequences. That feature is the main difference between our work and previous works. Experimental results on real surveillance video sequences captured in a metro station have proved the performance of two proposed methods.

Thi-Lan Le

Identifying the Common Elements of a Commercial Website by Semantic Ontology

The main objective of this research was to examine the structure and content of a commercial website as well as identify the common elements between these websites by using the ontology concept. A semantic approach was employed, in order to describe the structure and classify the content in a commercial website. The objectives of each website were examined by professionals from advertising agencies who have more than one decade of experience in building a commercial website. The ontology of each website was developed based on website’s objectives. Common elements were found in the results of the experiment. However, there was a wide range of properties in a same type of element.

Tirayu Songvetkasem

Computational Techniques in Political Language Processing: AnaDiP-2011

This paper presents a computational method, AnaDiP-2011, based on natural language processing (NLP) techniques for the interpretation of the political discourse. The application considers the 2009 presidential campaign in Romania. The concept behind this method is that the manner in which individuals speak and write betrays their sensibility. Our investigation is intended to give support to researchers, specialists in political sciences, political analysts and election’s staff, being helpful mainly in their social exploration of the electoral campaigns in their intend to measure reactions with respect to the developments in the political scene.

Daniela Gîfu, Dan Cristea

An Efficient Approach for Video Action Classification Based on 3D Zernike Moments

Action recognition in video and still image is one of the most challenging research topics in pattern recognition and computer vision. This paper proposes a new method for video action classification based on 3D Zernike moments. These last ones aim to capturing both structural and temporal information of a time varying sequence. The originality of this approach consists to represent actions in video sequences by a three-dimension shape obtained from different silhouettes in the space-time volume. In fact, the given video is segmented in space-time volume. Then, silhouettes are extracted from obtained images of the video sequences volumes and 3D Zernike moments are computed for video, based on silhouettes volumes. Finally, least square version of SVM (LSSVM) classifier with extracted features is used to classify actions in videos. To evaluate the proposed approach, it was applied on a benchmark human action dataset. The experimentations and evaluations show efficient results in terms of action characterizations and classification. Further more, it presents several advantages such as simplicity and respect of silhouette movement progress in the video guaranteed by 3D Zernike moment.

I. Lassoued, E. Zagrouba, Y. Chahir

Visual Information Based Argument Categorization for Semantics of Chinese Verb

Recently, language acquisition with aids of multi-modal information have drawn more and more attention. However, semantic grounding of verbs has been less concerned due to their complex semantic representation. This paper proposed a novel way to combine visual information into semantic representation of Chinese verb. While introducing original representation of two constituents, which are verb frame and argument from Frame Semantic, both of them are linked with visual information for verb semantic. And a visual information based categorization for arguments is mainly discussed. For achieving it, a collection of {video, its text description} pairs is first built. After preprocessing on both sides, the correspondence between arguments of verbs and related visual features is constructed basing on SOM groups. A video describing system has also been built to generate sentences for new videos. The evaluation of the describing system shows the effectiveness of our visual semantic representation on Chinese verbs.

HaiPeng Liu, XiaoJie Wang, YiXin Zhong

Information Science and Technology

A Novel Remote Detection Method of Illegal Electricity Usage Based on Smart Resistance

A power delivery system that uses power line communication can communicate with other electrical systems, monitor the quality of electrical energy, and create an economical solution for automatic meter reading. If we use a smart meter with the smart resistance proposed in this paper, we can easily add an illegal electricity usage detection capability to an electrical power delivery system for automatic meter reading. The main current of the circuit can be calculated from the value of the smart resistance and compares it with the measured main current. A mismatch between the measured current and the calculated current implies there is either illegal electricity usage inside the smart meter’s circuit. This paper presents the architecture of the system, the algorithm of the detection system, the model of the system, and the results of the simulation.

Byambasuren Bat-Erdene, Sang-Yep Nam, Dong-Han Kim

Applied Method for One Source Multi Use (OSMU) in the Broadcasting Communication Convergence Environment

Users increasingly use portable devices such as smart phone, tablet PC, and hence increase the advancements of technology for electronic transactions. With the advancements of technology, the development of OSMU (One Source Multi Use) system has shown rapid growth, but they have had limited use in anywhere. This paper suggested ICDS (Interactive Contents Delivery System) architecture for effectively transmits and manages the one source multi use service method by using the diverse digital devices in the broadcast communication convergence environments.

Hyunmi Jang, Sengphil Hong, Kyongjin Kim, Jae-Jung Kim

Finger Gesture Estimation for Mobile Device User Interface Using a Rear-Facing Camera

Mobile user interfaces is an increasingly important topic because of the rapid growth of smart phones and tablet PCs. Thus, we propose a new type of mobile user interface, focusing on mobile devices equipped with a rear-facing camera. In the proposed system, users can interact with mobile software applications using finger gestures with the hand which holds a mobile device, which are detected by a rear-facing camera. Skin-color segmentation, morphological operation, blob detection and skeletonization are used in finger pointer tracking and finger gesture estimation. Mouse events, directional commands and mobile applications can be controlled by the proposed finger gesture-based mobile user interface.

Jun-Ho An, Jin-Hong Min, Kwang-Seok Hong

An Adaptive Parameter Estimation Method for Wireless Localization Using RSSI Measurements

In location-based service (LBS), it is important to determine the location of a mobile user more, exactly and efficiently. In case of a wireless network, such as IEEE 802.11, a method using a received signal strength indicator (RSSI) for each access point is advantageous because it does not require additional infrastructure and it is suitable for the simplification. However, this technique of localization is required to investigate the propagation environment to determine the location of mobile user in advance. We propose a method in which the parameters of the propagation environment are determined using only RSSI measurements obtained during localization.

Jinhyung Park, Hyunhun Cho, Seunghae Kim, Dowoo Park, Ahsol Kim, Joongoo Park

Sidelobe Suppression Methods of Cubic-Phase Linear Chirp in Two-Ray Multipath Model for UWB Ranging

The UWB communication system occupies a very large bandwidth, 7.5 GHz. This enables high precision ranging that provides correct position information. In this paper, we will present a method to reduce side-lobes in receiver. Reducing side-lobes can enhance the accuracy of ranging system. Ranging system with high ratio of main-lobe to 1st side-lobe produces lower calculation error in ranging. Proposed cubic-phase chirp signal method can reduce the power of 1st side-lobe, that is, realize higher accurate ranging.

Jinhyung Park, Hyunhun Cho, Seunghae Kim, Changbeom Lim, Joongoo Park

Device Collaboration System Based on Context-Aware Architecture in Smart Environment

In recent times, research is being actively carried out to enable the seamless use of a single content using many different varieties of devices in smart environments, anytime, anywhere. However, present researches are limited to receiving provider-centered services from various cell phones with the same operating system and therefore this thesis suggests, within this model, a device collaboration system based on context-aware architecture to provide a user-centered service. To allow content sharing between different devices, this system collects not only internal/external contextual information but the locations of all devices within the smart environment, resources and service information. Then, through suggested context interpretation structure it predicts the user’s intention and service, and selects the best device right for using the content to be run and therefore provides a personalized user-centered service. To verify the suggested system structure, smart environment and scenario were built and whether or not the content sharing service functioned through the best device depending on context-awareness was tested.

Sook-Youn Kwon, Chan-Yung Choi, Jae-Hyun Lim

Developing English Learning Contents for Mobile Smart Devices

The study developed three items in total. First, the application which enables learning contents run on Android OS and Windows Mobile OS was developed. Second, contents which will be applied on the application were manufactured. The contents developed in this study are for learning English presentations. The contents are classified into two parts; Part 1 is for basic English presentations, and Part 2 is for advanced English presentations. The third development is Learning Management System(LMS) that is driven by connected with PC. Contents studied on mobile devices are recorded by LMS, so that users can learn continuously not only on mobile devices but also on PC. We analyzed the questionnaire responses with respect to UI satisfaction and satisfaction of the learning experience. The UI satisfaction results showed that 85% of the participants were satisfied at an ordinary or higher level with our system. And The satisfaction of the learning experience results showed that 95% of the participants were satisfied at the ordinary or higher level with our system.

Seongwon Park, Kwangeak Kim, Bong Gyou Lee

Pre-test Analysis for First Experiences of Korean E-Voting Services

This study is a pre-test research conducted before introducing an evoting system by Korean e-Government. The purpose of this empirical study is to establish research hypotheses based on UTAUT model of Venkatesh et al. and to prove causal relationships among defined factors influencing on user acceptance for an e-voting system. In Korea, though actual user groups were extremely limited, we collected data from 116 persons who had experienced trial operation for this e-voting system and derived both theoretical and practical propositions and implications. As the result of this study, including the new variable of ‘ubiquity’ in consideration of the specific characteristics of evoting, overall variables defined in this research model are examined partially by means of empirical analysis process to identify the statistical significance. The outputs of this research may provide theoretical basis and political implication necessary for developing countries’ planning to introduce e-voting in the future

Ki Youn Kim, Dae Jung Kim, Bong Gyou Lee

Analyzing User Satisfaction Factors for Instant Messenger-Based Mobile SNS

Users of smart phone-based instant messenger such as KAKAO TALK, MSN messenger are rapidly increasing. However, research on user satisfaction for smartphone instant messengers has not been done at all. This study analyzed factors affecting user satisfaction by conducting a survey on 220 users of mobile messengers in smartphones. The survey results showed that self-disclosure, flow, and social presence significantly affected user satisfaction. This study will benefit researchers and contribute to industries that possess interest in factors affecting user satisfaction regarding the use of smartphone applications and mobile messengers.

Seongwon Park, Duckshin Oh, Bong Gyou Lee

Analysis of the RPS System in Korea Based on SCP Framework

The purpose of this study is to examine why a separate quota was assigned for Photovoltaic power generation when introducing the RPS (Renewable Portfolio Standards) in Korea, as well as the implications of the new system to relevant policies. This study has examined the structure of the Korean new and renewable energy industry using the SCP(Structure-Conduct-Policy) framework. The results of the study show that though the standard currently has a high generation cost and is therefore comparatively lacking in competitive edge, the overall growth trend of the industry suggests high future potential. The study is expected to be utilized as data for other countries that are considering the application of, or are currently running RPS systems.

Giseob Byun, Taisiya Kim, Ki Youn Kim, Bong Gyou Lee

A Design of Short-Term Load Forecasting Structure Based on ARIMA Using Load Pattern Classification

This paper suggests a short-term electricity load prediction structure for collection of most efficient energy operating plan by predicting the next day’s demand from separately measured past electricity demand. The present short term load prediction methods predict the next day’s electricity expenditure using a probability method, time-series method or a nerve network model without separation between similar data in a traditional way or uses a standard method of season separation or day separation. However if data separation is not done, fluctuating parameter that affects load like season and day cannot be responded to and in the case of the latter there is a problem caused due to the recent increased fluctuation of climate data - separation without similarities arises and so the prediction rate decreases. This paper separated collected electricity expenditure into months, holidays, Monday, Saturday and weekdays by high similarities and short term electricity load prediction is carried out based on time-series prediction method ARIMA. Also, to evaluate the accuracy of the prediction simulation will be done based on the collected data.

Kyoung-Mi Im, Jae-Hyun Lim

Comparative Analysis of Learning Effect on Lexical Recognition in the e-Learning and s-Learning

The purpose of this study is to analyze learning effects of e-learning and s-learning on learner’s brain. The subjects of this study were twenty elementary school students. The experimental group was divided into two groups and both groups learned the same content. As a result of the research, both groups showed improvement. But s-learning is higher than e-learning in the effect of learning based on the brain.

JaeChoon Jo, HeuiSeok Lim

Predicting Text Entry for Brain-Computer Interface

A brain-computer interface (BCI) is a communication system that translates brain activity into commands for a computer or other devices. In other words, BCIs create a new communication channel between the brain and an output device by bypassing conventional motor output pathways consisting of nerve and muscles. This is particularly useful for facilitating communication for people are totally paralyzed. However, it is hard to practical use because low communication rate. Therefore, in this paper, we propose a method to speed up text entry in BCI using a statistical language model.

Saebyeok Lee, Heui-Seok Lim

A Safe Driving Support System for Motor Vehicles with DSRC

In this paper, a safe driving support system for motor vehicles is disclosed. The system is designed to prevent traffic accidents via inter-vehicle communication even in the case where a driver cannot obtain sufficient information of a region, such as curved roads, crossroads, and the like, using only auditory and sight senses. The system is operated as follows via an antenna and communication module mounted on a vehicle. When receiving information of an opponent vehicle on the road via inter-vehicle communication, the system compares conditions of a host vehicle with those of the opponent vehicle and determines a proper service for the host vehicle. Then, a warning for a driver of the host vehicle was generated as a front-vehicle warning, rear-vehicle warning, side-vehicle warning, host-vehicle warning, etc. in accordance with the determined service. In the experiment for checking the operation of the system, the prototype vehicle sent and received vehicle information, such as vehicle speeds, vehicle positions, parking and stopping of a vehicle, driving conditions, driving directions, and the like, and provided the information to the driver of the host vehicle. Further, the system calculated a vehicle-to-vehicle distance, and processed information of curved roads and crossroads and alarm generation in accordance with a degree of danger through the vehicle terminal.

Myung Hwa Hyun, Jisu Park, Jingon Shon, Kwang Sik Chung

Changes and Directions of Mobile Technology and Infrastructure to Enhancing Public Education: Policy and Strategy Perspectives in South Korea

In this study, we review national informatics policy and strategy whether the policy and strategy support the use of mobile technology in public education. The rapid growing of mobile technology and infrastructure changes social and educational paradigm. With regard to the technological changes, it is necessary to establish a sustainable national policy and strategy for supporting public education. For this, we review relevant documents and papers based on an analysis framework. In addition, we discuss the directions of national informatics policy and strategy in order to strengthen the capacity of public education in South Korea via mobile learning.

JiYoung Choi, Hye Jeong Kim, WonGyu Lee

A Cognitive Ability Measuring System with Cognitive Loading Task

This paper was developed a cognitive ability measuring system to investigate that give effect of a cognitive load capacity. This paper of a hypothesis is increase of cognitive abilities when cognitive load capacity is increase and then cognitive abilities are decrease when cognitive load overload. This system offers about cognitive abilities that are attention, memory, processing changes and processing difficulty. The process observes to change of cognitive ability through with 2minute of cognitive load task and 2minute of cognitive measuring task. This paper of result affects the attention ability to cognitive load capacity, but other cognitive abilities are not affects.

YeongWook Yang, HeuiSeok Lim

Automatic Music Emotion Classification Using Chords and BPM

Existing research on music emotion classification has used the mp3 files’ meta-information and meaning of lyrics or users’ feedback description to classify the music emotion after hearing the music. In this paper, we propose the new method that classifying the music emotion by extracting chords and using Beats per Minute information of digital music. Firstly, get the valence value by the used chords, and get the arousal value by using Beat per Minute information and the extract the emotion of the music by mapping such values with Russell’s emotion model.

Sang-yong Park, Han-moi Sim, Mi-kyung Kwon, Won-hyung Lee

The Real-Time Stereoscopic 3D Image Conversion of Photo and Video Contents

We propose a method for converting existing 2D image contents to 3D image contents by using hardware based real-time 2D/3D stereoscopic image conversion algorithm. The stereoscopic converted images come from the method that generates the 3D stereoscopic images from 2D images or 2D videos, not videos from stereo camera. The real-time 3D stereoscopic conversion algorithm is produced by hardware that is based on physical board to complement computational complexities and slow down caused by the limitation of processing. The existing interactive video art which is using screen and PC camera, was able to present various kinds of general exhibition, however, it had limited technology to express real-time stereoscopic.

Jun-Eui Lee, Sang-Won Lee, Won-Hyung Lee

The Changes in Performance during Stress-Inducing Cognitive Task: Focusing on Processing Difficulty

One stress-inducing task and two cognitive tasks were used to investigate how these tasks influence one’s cognitive capability. First, the participants performed stress-inducing tasks for 5 minutes. They were then divided into two separate groups, and were given two kinds of cognitive load tasks which differed in difficulty levels. Finally, a cognitive task for evaluating cognitive capabilities of the two groups was conducted. This procedure was repeated 4 times, 2 minutes for each task, which showed that there was a tendency of improved performance over time. We found no reaction time and performance rate changes with respect to processing difficulty. However, the interaction between difficulty and repetition was significant, which meant participants who were assigned to easier tasks showed unstable performance compared to those who were assigned to high-difficulty tasks. These results suggest that imposing a proper amount of stress and cognitive load could promote cognitive performance in general.

Jinyoung Song, Taewon Chung, Jinwon Kang, Kichun Nam

The Changes in Performance during Cognitive Load Inducing Tasks

This study examined the performance of one’s cognitive abilities during various different mental cognitive load tasks. A stress-inducing task was administered during the course of performing three different kinds of cognitive load tasks. The three types of cognitive load demands included attention, memory and processing change. Participants in this study performed two tasks for each demand. Error rates, number of completed trials, and response times of all three types of cognitive load demand tasks were measured. The results suggest that for attention demand task, the response time decreased as time increased whereas no difference was found in memory demand task. In processing change demand task, the number of completed trials increased as the response time increased. This study shows a change in the performance of cognitive tasks depending on the type of cognitive load, which in turn suggests the importance of implementing different kind of methods and measuring tools when assessing cognitive abilities in individuals.

Heejin Park, Yoonkyung Choe, Yoonhye Na, Kichun Nam

Emotion Based Gesture Animation for Mobile Phone

Recently people do not only use mobile phone to call, but also use it to send a SMS. However, it is difficult to express own complicated emotion with text and emoticon of exited SMS service. We pay attention to express user’s emotion interesting and correct, we use character animation. This paper suggests emotion based gesture animation generation system that uses character’s facial expression and gesture to delivery emotion excitably and clearly. Michael[1] investigated interview of two people who has stylized gesture. They suggested gesture generation graph for stylized gesture animation. In this paper, we focus to analyze and extract emotional gestures of Disney animation characters and create 3D models of extracted emotional gestures. To express emotion of person, we use emotion gesture generation graph that import the emotion flow graph that expresses emotion flow for probability. We investigated user reaction for research proprieties of suggested system and the alternation propriety.

Haewon Byun

Interaction for Interactive Popup Book

Recently popular media, book, has problems to satisfy a child who wants to be a character in a story, because it just transmits fixed story. Therefore, many people are interested in interactive contents that are changed variously by user’s acting in multimedia division. This paper introduces an interactive pop-up book system that can control a story of book by interesting interactivity. This system suggests a special story graph that transforms a linear architecture story to a interactive story by traversing diverse node. We focus to make a special pop-up book interface and wind blowing interface for physical environments to have interesting and familiar user interaction, and to conclude by user studies. We also investigated user preference for various interactive story paths, so we can exclude unnecessary stories and surveyed to compare before the excluding and after. Finally, story paths that user prefers are introduced in the Interactive Popup Book System.

Haewon Byun

The Mobile ID Based Biometric Undeniable Signature Scheme

The wide use of mobile devices such as smart phones makes the mobile commerce industry be growing-up rapidly. In mobile commerce security, how to secure a copyright of mobile contents and how to distribute it are of major concern. The user can carry the smart phone regardless of the places. The utilization of a smart phone is very high than that of personal computers. The USIM(Universal Subscriber Information Module) inserted in the smart phone binds the user with the device. This means that the smart phone can be used to represent the owner’s identity. In this paper, the mobile ID based biometric undeniable signature scheme is proposed. The mobile ID is created with USIM and the user’s biometric template. In addition, undeniable property of our signature scheme can make ID based applications such as mobile voting be possible with smart phones.

SungHyun Yun

Automatic Metadata Conversion System with Ontology

Some information providers or information circulation centers are collecting various metadata to serve users. The collected information has various structures and expression types of contents as well as file types. For information service, these various types of metadata should be processed and converted into one unified form. Converting metadata has lots of difficulties and mapping between elements of metadata schema is most important and difficult. We are making an automatic metadata conversion system with ontology. This paper describes the conversion method with ontology and schema mapping tool in the system.

Min-Ho Lee, Hwa-Mook Yoon, Won-Kyung Sung, Jae-Cheol Ryou

A Research Model for Evaluating the Success of the DCMS: A Digital Content Management System

The digital content management system, called DCMS, is similar to early information system ideas. For evaluating success of the DCMS, some success factors except success factors by Delone and Mclean are considerable because it is a system for digital content management and with web-based technologies. Based on the information system success model by Delone and Mclean, we added two success factors presented by research of Quaddus and Lau; user participation, user characteristics. Also three factors are taken directly from Delone and Mclean, but modified in appropriate ways for the DCMS. The main contribution to the literature from this study is to theoretically articulate conceptual model for evaluating the success of the DCMS.

Sung-Ho Shin, Wha-Mook Yoon, Won-Kyung Sung

User’s Location Prediction System Using the Filtering with Correlation Coefficients Weight

This paper proposes User’s Location Prediction System using the Filtering with Correlation Coefficients Weight. This system heterogeneous data occurred during the process of collecting context information into homogeneous data, and improves the accuracy of clustering needed for location-awareness. Also, it applies correlation coefficients weight to extract features and predicts user’s location through ARIMA time-series analysis. For the evaluation of the proposed method a test bed is constructed, tested and compared with the method without weighting.

Kyoung-Mi Im, Chan-Yung Choi, Jae-Hyun Lim

An Efficient String Searching Algorithm Based on Vowel Occurrence Pattern

String searching algorithm is used to determine whether a word, a statement and a phrase exists in newspaper article, books, web pages or not. Especially as the volume of web pages and documentation increases, time and cost of searching a pattern increases. In this paper, we consider the characteristics of English alphabets combination in a pattern and a text(frequency and position of vowels in a pattern and a text), and propose new efficient string searching algorithm based on vowel composition structure of pattern and text. If a pattern has two or more vowels, proposed vowel-based string searching algorithm is more efficient at the both case of best matching case and worst matching case. Especially, a pattern’s length does not affect performance of proposed vowel-based string searching algorithm. Only a pattern’s location in a text can affect running time of algorithm. Proposed vowel-based string searching algorithm can avoid un-matching vowels in a text and un-necessary comparison between a pattern and a text. Therefore in reality, vowel-based string searching algorithm is usefully and effectively applicable to string searching function of a pattern and a text.

Kwang Sik Chung, Heon-Chang Yu, Sung Ho Jin

A Flexible Cost-Based Privacy-Aware Data Integration System in Cloud

When all the services provided in cloud computing are on-demand and highly commoditized, consumer would like to pay different prices for those privacy services with different protection assurances according to the importance of their data. We recently present a privacy-aware inter-cloud data integration system considering tradeoff between the privacy requirements from users and the charging for those data protection and processing. In this paper, we extend our previous work by providing four query execution schemes which assures a more sophisticated and flexible privacy protection. Another contribution of our paper is that we proposed an approach for allocating those schemes. As the schemes applied in user’s query are relevant and will affect the scheme selection for the next data query, our method assures that those schemes can be implemented properly.

Yuan Tian, Biao Song, Eui-Nam Huh

An Applicable Model Enabling IPTV Service Delivery over Virtual Network

In this work, an applicable model enabling IPTV service providers to use a virtual network (VN) for IPTV service delivery is designed. The current topologies used in backbone or IP overlay-based content networks to deliver IPTV services cannot be directly applied as VNTs since virtual node, link, or video source failure on those topologies will cause service interruptions for customers. Therefore, in this work, a more reliable virtual network topology for solving a single virtual node, virtual link, or video server failure problem is designed. A novel optimization objective and an efficient VN construction algorithm have been developed for building the proposed topology. Various simulations were conducted to verify the effectiveness of the proposed VNT as well as the associated construction algorithms in terms of reliability and efficiency.

Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh

Virtualization of Access Network for Multihomed Wireless Thin Client

An access network is the part of a communications network which connects the multihomed thin client to the immediate service provider. In a thin client computing architecture, application processing is delegated to a remote server rather than running it locally. User input is forwarded to the server, and the rendered images are relayed through a dedicated remote display protocol to the thin client. For this reason availability and seamless guaranteed connectivity to the internet are the key issues in multihomed wireless thin client. Traditional multi homed thin client architecture does not provide seamless service provisioning due to the unavailability of suitable handoff mechanism among the access network. Virtualization of wireless access network can be a promising solution for seamless connectivity to the multihomed thin client. In this paper we focus on the virtualization of access network for the multihomed wireless thin client architecture and the selection of appropriate access network with the special attention to user satisfaction.

Md. Motaharul Islam, Jun-Hyung Lee, Eui-Nam Huh

New Optimization Techniques for Shear-Warp Volume Rendering

A shear-warp algorithm with run-length-encoded volume, one of the fastest CPU-based speed acceleration techniques developed so far for direct volume rendering, has various defects such as increase in memory consumption as well as preprocessing time and deterioration in image quality. This paper provides two kinds of new optimization techniques which can solve such defects without degrading rendering speed. One optimization technique concentrates on enhancing image quality while decreasing memory consumption without reducing rendering speed by making direct access to the memory space where the initially loaded volume data is stored. The other concentrates on decreasing preprocessing time and hence accelerating rendering speed by creating only one run-length-encoded volume and combining non-photorealistic rendering techniques with shear-warp algorithm. We shall show a novel result that both optimization techniques efficiently decrease the memory consumption and preprocessing time while enhancing rendering speed and image quality simultaneously.

Ki-Young Choi, Sung-Up Jo, Chang-Sung Jeong


Additional information

Premium Partner

    Image Credits