Skip to main content

2012 | Buch

Future Information Technology, Application, and Service

FutureTech 2012 Volume 1

herausgegeben von: James J. (Jong Hyuk) Park, Victor C.M. Leung, Cho-Li Wang, Taeshik Shon

Verlag: Springer Netherlands

Buchreihe : Lecture Notes in Electrical Engineering

insite
SUCHEN

Über dieses Buch

This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs.

The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in many types of future technology. The main scope of FutureTech 2012 is as follows.

Hybrid Information Technology

Cloud and Cluster Computing

Ubiquitous Networks and Wireless Communications

Multimedia Convergence

Intelligent and Pervasive Applications

Security and Trust Computing

IT Management and Service

Bioinformatics and Bio-Inspired Computing

Database and Data Mining

Knowledge System and Intelligent Agent

Human-centric Computing and Social Networks

The FutureTech is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of future technologies.

Inhaltsverzeichnis

Frontmatter

FutureTech 2012 - main conference

A New Proxy Electronic Voting Scheme Based on Proxy Signatures

Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schemes do not seem to meet the requirement of delegation. For example, a stockholder may want to assign some other person in the company to vote by using a warrant, and the system should provide such service. In this paper, the authors propose a novel e-voting scheme called the proxy e-voting scheme that has the ability to delegate a proxy to vote. The proxy e-voting scheme can satisfy all the requirements we bring up. As a result, the scheme not only can be easily implemented but also has less computational cost for voters to cast the ballots.

Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin, Min-Shiang Hwang
Cellular Automata for Topology Control in Wireless Sensor Networks Using Matlab

We use cellular automata for simulating topology control algorithms in wireless sensor networks (WSNs) using the Matlab programming environment. Our objective has been to provide experimental evidence in order to (i) investigate whether potential researchers who lack sound programming skills but would like to promptly implement their ideas with confidence should use cellular automata rules and Matlab in order to experimentally evaluate their works and (ii) evaluate how the selection of a Moore or a Margolus neighborhood in cellular automata models can affect the performance of simulations of topology control algorithms in WSN.

Stavros Athanassopoulos, Christos Kaklamanis, Gerasimos Kalfountzos, Evi Papaioannou
Energy Efficient Complete Coverage Path Planning for Vacuum Cleaning Robots

The present study examines the efficiency of the back-and-forth method and boundary sweep method used for complete coverage path planning (CCPP). After identifying limitations of these existing methods, the present study develops and proposes a new, alternative CCCP method that can be used for designing more efficient vacuum cleaning robots.

Eunil Park, Ki Joon Kim, Angel P. del Pobil
Education Embedded System for Remote Control

This study implemented a remote control system using PDA based on WINDOWS CE.NET. In existing remote control systems, the user generally controls remote objects and obtain data using a computer, which is a local system connected to the Internet, and the remote objects are connected to server computers. In order to control remote objects, the user has to have a computer, a space to use the Internet, and wired Internet. The system proposed in this study uses an embedded board as a server and PDA as a client. Thus, the user can control remote objects at any place as long as wireless Internet is available. In addition, because an embedded board is used as a server, the system has the characteristics of high performance and low power consumption. The proposed system provides not only remote control environment using PDA but also conventional control environment using a computer as a client. In case PDA is not available, remote objects still can be controlled from any place as long as there are wired Internet and a computer.

Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim, Dongsik Kim, Ahn Dal, ChangWan Jeon, Sunheum Lee, Sangyeon Woo, HeungGu Jeon
Novel Two Factor User Authentication Scheme over WSNs

Wireless sensor networks (WSNs) have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment. Recently, Khan and Alghathbar proposed an improved two-factor user authentication (K–A scheme) in WSNs. This paper shows that the K–A scheme is still weak against the user impersonate attack and the password guessing attack and propose a novel two-factor user authentication scheme to fix the susceptibilities to the previous scheme. The proposed scheme could support more security and robustness than the K–A scheme in WSNs.

Hyunsung Kim, Xin-Yi Chen
BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme

A Mobile One-Time Password (OTP) mechanism solves the password security problem that could result from reusing the same password multiple times. Eldefrawy et al., has presented a two-factor OTP-based authentication scheme using mobile phones which provides forward and infinite OTP generation using two nested hash functions. However, they have not formally analyzed their protocol. In this paper, we are going to formally analyze their presented algorithm with a BAN logic analysis to proof its security in a formal way. The logical postulate is applied to proof the desired attributes of our mobile OTP based two factor authentication using mobile phone. The analysis shows that the security of illustrated protocol has been formally proved.

Mohammed Saeed Alkatheiri, Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan
VLSI Design of a Hardware Efficient FFT Processor

This paper presents a CORDIC-based radix-4 FFT processor, which adopts an improved conflict-free parallel memory access scheme and the pipelined CORDIC architecture. By generating the twiddle factor correctly, the proposed FFT processor eliminates the need of ROM making it memory-efficient. Synthesis results show that the 16-bit 1024-point FFT processor only has 45 K equivalent gates with area of 0.13 mm

2

excluding memories in Chartered 90 nm CMOS technology. When the operating frequency is 350 MHz, the proposed FFT processor performs 1024-point FFT every 3.94 μs.

Dongpei Liu, Hengzhu Liu, Jianfeng Zhang, Botao Zhang, Li Zhou
Arithmetic P System Without Priority Rules

Arithmetical operations are fundamental in many computing models. Based on cell-like P system, this paper designs arithmetic P systems and gives a group of evolution rules without priority for arithmetical operations such as addition, subtraction, multiplication and division. Furthermore, we analyze the complexity of each of these arithmetic operations.

Ping Guo, Haizhu Chen
Multipath-Based Reliable Routing Protocol with Fast-Recovery of Failures on MANETs

This paper proposes a new multipath reliable routing protocol which has the fast-recovery capability of link failures on MANETs. The proposed protocol finds a reliable multipath considering the end-to-end packet reception probability of routes using Expected Transmission Count (ETX) link quality estimator. After setting a primary path which is the most reliable between the source and destination, the secondary paths are established to be used for recovering link failures. When a link failure happens, the proposed protocol recovers the failure quickly using the secondary paths without re-establishing paths at the source. The performance of the proposed protocol has been evaluated using QualNet simulator and compared with NMDR, MAODV-SIM, and HLAR. The simulation results show that our protocol is better in terms of end-to-end packet reception rate, end-to-end delay, and path recovery time.

Myung-Kyun Kim, Hoai Phong Ngo
Novel Hybrid Silicon/CNT 4T SRAM Cell Design

With CMOS technology scaling down, static random access memories (SRAMs) consume more than 90 % of chip area and power consumption in modern microprocessor designs and system-on-chip applications. In order to achieve lower power consumption and less area for SRAMs, 4T SRAM structure can be used. However, the conventional silicon 4T SRAM suffers low static noise margin (SNM) and other stability issues compared with commonly used 6T SRAM. In order to improve the SNM and the robustness of 4T SRAM, in this paper we propose a novel hybrid silicon/carbon nanotube (CNT) 4T SRAM structure. The latch transistors in silicon 4T SRAM structure are replaced with carbon nanotube field effect transistors (CNFETs). The proposed design reduces 58 % cell area compared with silicon 6T SRAM and features improved performance and stability compared with silicon 4T SRAM. With the benefits of low OFF current and high ON current from CNFET devices, the proposed hybrid 4T SRAM has 8.3x faster reading speed, 2.5x faster writing speed, 34.5 % reduction for reading power and 24 % reduction for writing power compared with silicon 4T SRAM. The SNM of the proposed design is increased to 6x and 1.11x compared with silicon 4T and 6T SRAM respectively.

Wei Wang, Haiqing Nan, Ken Choi
Storage-Efficient Data Prefetching for High Performance Computing

Data prefetching is widely adopted in modern high performance processors to bridge the ever-increasing performance gap between processor and memory. Many prefetching techniques have been proposed to exploit patterns among data access history that is stored in on-chip hardware table. We demonstrate that the table size has considerable impact on the performance of data prefetching. While a small table size limits the effectiveness of the prediction due to inadequate history, a large table is expensive to be implemented on-chip and has longer latency. It is critical to find a storage-efficient data prefetching mechanism. We propose a novel Dynamic Signature Method (DSM) that stores the addresses efficiently to reduce the demand of storage for prefetching. We have carried out extensive simulation testing with a trace-driven simulator, CMP$im, and SPEC CPU2006 benchmarks. Experimental results show that the new DSM based prefetcher achieved better performance improvement for over half benchmarks compared to the existing prefetching approaches with the same storage consumption.

Yong Chen, Huaiyu Zhu, Hui Jin, Xian-He Sun
A New Data Sieving Approach for High Performance I/O

Many scientific computing applications and engineering simulations exhibit noncontiguous I/O access patterns. Data sieving is an important technique to improve the performance of noncontiguous I/O accesses by combining small and noncontiguous requests into a large and contiguous request. It has been proven effective even though more data is potentially accessed than demanded. In this study, we propose a new data sieving approach namely Performance Model Directed Data Sieving, or PMD data sieving in short. It improves the existing data sieving approach from two aspects: (1) dynamically determines when it is beneficial to perform data sieving; and (2) dynamically determines how to perform data sieving if beneficial. It improves the performance of the existing data sieving approach and reduces the memory consumption as verified by experimental results. Given the importance of supporting noncontiguous accesses effectively and reducing the memory pressure in a large-scale system, the proposed PMD data sieving approach in this research holds a promise and will have an impact on high performance I/O systems.

Yin Lu, Yong Chen, Prathamesh Amritkar, Rajeev Thakur, Yu Zhuang
Destination Guided Mobility Models for Mobile Ad Hoc Networks

Mobility models play an influential role in the simulation studies of mobile ad hoc networks. This paper contains two main contributions related to mobility models: (i) a framework of new mobility models that are simple and effective, and (ii) a software tool to generate, visualize, and analyze the generated mobility traces. The appeal of the proposed models is that they are almost as simple as the popular random waypoint model, but powerful enough to generate realistic mobility traces with desired characteristics. The power and versatility of the proposed models are illustrated using limited simulation experiments.

Alex Aravind, Viswanathan Manickam
Development of a Web-Based Educational Java Applet for Understanding Concepts and Principles of Digital Logic Circuits

This paper presents web-based Java applet for understanding the concepts of digital logic circuits. Through our educational Java applet, the learners will be capable of learning the concepts and theories related to circuit experiments and how to operate the virtual experimental equipments such as multimeters, function generators, digital oscilloscopes, DC power suppliers and bread board etc. The proposed our educational Java applet is composed of five important components: Principle Classroom to explain the concepts and theories of electronic and digital circuit operations, Simulation Classroom to provide a web-based simulator to the learners, Virtual Experiment Classroom to provide interactive Java applets about the syllabus of off-line laboratory class, Assessment Classroom, and Management System. With the aid of the Management System every classroom is organically tied together collaborating to achieve maximum learning efficiency. We have obtained several affirmative effects such as high learning standard, reducing the total experimental hours and the damage rate for experimental equipments.

Dongsik Kim, Jaeho Cha, Saeron Han, Seongyong Lee, Kwansun Choi, Jongsik Lim
Detecting and Modeling the Structure of a Large-Scale Microblog

Weibo, the most prevalent microblog system in China, has become part of many Chinese’s life. It commands more than 250 million users in 2 years and become the most influential medium in China, but few papers talked about it. The goal of this paper is to study and model the structure of Weibo, which is also less discussed on other online social networks such as Twitter or Facebook. We have developed a dedicated Weibo crawler, which enables us to crawl Weibo’s overlay, and got about 20 million users’ profiles. The results obtained through these data bring important insights into online social networks (OSNs). Specially, our results show Weibo has a core/periphery structure, which is never reported before. Our studies reveal the structure of Weibo, which is valuable for the development of future online social networks.

Zhengbiao Guo, Zhitang Li, Hao Tu, Da Xie
Research on the Query Subsystem for Large Information System Based on Decision-Making

In this paper, Information System is introduced firstly, and then combining practical examples during our development of IS, on the basis of the establishment of the decision-making oriented query subsystem in large Information System, the query subsystem in the Information System based on decision-making is designed, moreover, the query subsystem is implemented following the query processing principle.

Hui Liu, Xiang-Hui Zhao, Lin Liu, Lei Zhang, Yan-Zhao Liu
HOTP-Based Key Agreement Protocol Over Home Network

Recently, Interest usage in home network is increasing rapidly with the rapid growth of Internet users and wireless devices. For home networks, robust security services including remote user authentication have become essential requirements. Lee proposed an attributes-based authenticated key agreement protocol over home network. Thereby, this paper will show that Lee’s protocol has weaknesses in security and proposes a HOTP-based key agreement protocol to solve the problems in Lee’s protocol. The proposed protocol achieves the security by combining the properties of HTOP and attributes-based cryptosystem.

Hyunsung Kim, Hyun Jung Kim
Smartcard-Based User Authentication Protocol over Home Network

Recently, as home network service is popularized, the security concerns are growing up for the home network. User authentication is the first step in any cryptographic solutions. There are protocols for the user authentication including TTA’s standard EEAP-PW. However, they still have security problems. Thereby, this paper proposes a smartcard-based user authentication protocol over home network to solve the problems in the previous researches. The proposed protocol has the same purposes with the other previous researches, which provides both authentication and key agreement and is based on the similar security requirements against password guessing attack, impersonation attack, replay attack and so on.

Hyunsung Kim, Hyunhee Jung
QoE Management in a Video Conferencing Application

In this paper a framework for managing the QoE for videos encoded with the H.264 codec and transmitted by video conferencing applications through limited bandwidth networks is introduced. We focus our study on the QCIF resolution and medium motion videos, one of the most pervasive video formats used by video conferencing applications across the Internet and cellular systems. Using subjective tests for measuring the level of video quality perceived by end users, we expose the relation between the main influential video parameters and the quality experienced by end users. Further, after investigating the effect of different frame rates and compression levels on video streaming bitrate and consequently on QoE, a QoE control mechanism is proposed for limited-bandwidth cases.

Ahmad Vakili, Jean-Charles Grégoire
Extended OTP Mechanism Based on Graphical Password Method

OTP (One Time Password), a financial security authentication mechanism mainly used nowadays, is possible to cope with session attacks but has an weakness that it is difficult to apply differentiated mechanisms. This study intends to propose an extended OTP mechanism utilizing Graphical password method in order to solve such problem of the existing method. The proposed method is a Graphical password mechanism in story method based on user’s memory and can cope with various financial hackings and attack techniques. The existing authentication mechanisms have also a weakness in reliability to be used in mobile devices. In order to complement such weakness, GOTP (Graphical One Time Password) method was introduced so that users may use it in the Smartphone environment more easily and safely. Lastly, the effectiveness and validity were confirmed through an user study.

Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon, Manpyo Hong, Hongjin Yeh, Jai-Hoon Kim
Multi-Dimensional Analysis of Political Language

This paper presents a method for the valuation of discourses from different linguistic perspectives: lexical, syntactic and semantic. We describe a platform discourse analysis tool (DAT) which integrates a range of language processing tools with the intent to build complex characterisations of the political discourse. The idea behind this construction is that the vocabulary and the clause structure of the sentence betray the speaker’s level of culture, while the semantic classes mentioned in a speech characterises the speaker’s orientation. When the object of study is the political discourse, an investigation on these dimensions could put in evidence features influencing the electing public. The method is intended to help both political speakers to improve their discourse abilities, by comparing their speeches with those of personalities of the public life in the past, and the public at large by evidencing hidden aspects of the linguistic and intellectual abilities of their candidates.

Daniela Gîfu, Dan Cristea
Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from Taiwan

Real-time traffic information service is an important part of Intelligent Transport Systems (ITS), and the performance of service is a major concern to transportation planners and road users. For users, getting sufficient and complete traffic information is helpful for them to arrange optimal road path before heading. This paper describes some traffic prediction technologies deployed in Taiwan, such as vehicle detector (VD), GPS-based vehicle probe (GVP) and cellular floating vehicle probe (CFVP), and each of them has different intended purposes. Through data fusion to analyze and regularize traffic information from various traffic prediction technologies, it makes the incomplete information converting into systematic and useful traffic information.

Jui-Yen Chang, Tung-Wen Wang, Sheng-Hui Chen
WiMAX Application for E-Police Patrolling System

WiMAX is one of wireless broadband transmission standards, which is based on IEEE 802.16 serious. Its signal coverage, UL/DL rate, and bandwidth efficiency are better than traditional ones. It can be the last mile for where the cable and DSL network cannot reach. Because of its characteristic of broadband access and mobility, wireless applications become more enhanced and various. E-Police Patrolling System is one of the wireless applications over WiMAX network. It can help commander monitor any event in front of police officers, and talk to officers via VoIP. In contrast to traditional approach where police on patrol can only give voice back to commander. E-Police Patrolling System can provide both audio and video information of the scene. According to this, commander can give instructions more efficiently and clearly. In this paper, architecture of device and the working scenario of E-Police Patrolling System are going to be presented.

Wan-Yi Lin, Rui-Yen Chang, Yu-Cheng Chen, Chin-Lung Lee
Development of LED Irradiation System for Cell Proliferation of Medical Applications

We developed LED irradiation system for cell proliferation of medical applications. This system was fabricated using a u-controller, field programmable gate array (FPGA) and high brightness LEDs. The designed system enables us to control irradiation time, intensity, pulsed wave mode and so on. Especially, it was found that it is possible to control optical power in 30 steps by controlling the currents and to conduct light radiations at 100 Hz, 1 kHz, 10 kHz, and 100 kHz by using FPGA. In this study, we analyze the effect of pulsed LED light on the in vitro experiment of bone marrow cells proliferation.

Min-Woo Cheon, Tae-Gon Kim, Yang-Sun Lee
The Study on the Mobile Diagnostic X-ray Device of Frequency Modulation Method by PI Controlled

Mobile X-ray device which is typically used in the mobile type of X-ray can be used very usefully beyond the space restriction. In this study, we had designed and produced the high capacity of mobile X-ray device which does not have the limitation on diagnostic areas of the body, and then we were identified the operating characteristics of device according to the load variations. Mobile X-ray device is used the high capacity condenser which gives light weight and high performance for produce the mobile X-ray device that does not have a limit the diagnosis of the human body without a separate area of the power plant. It was designed and manufactured the high voltage generator device which is applying the frequency modulation method that is known to be excellent of reduced the power consumption of high voltage occurrence and power factor. Therefore, we were confirmed the X-ray irradiation and change in frequency which are caused by load variations used by oscilloscope and exposure dose meter.

Young-Pyo Kim, Tae-Gon Kim, Yong-Pil Park, Min-Woo Cheon, Yang-Sun Lee
Trusted Routing in AODV Protocol Against Wormhole Attack

This research aims to develop an enhanced version of AODV including trust and reputation that will ensure the transmission of messages in a secure way avoiding wormhole attackers in the network. Firstly, wormhole attackers are identified depending on their transmission related misbehavior with respect to other nodes in the network. Next, appropriate trust value is assigned to the misbehaving nodes. Furthermore the measure of trust is calculated by considering the past interaction between the considered node with other nodes in terms of direct and indirect interactions and related trust values. Finally, the trust evaluating node takes the decision to include or not to include the trustee node in discovered route and secures the path from wormhole attacker. The key concept to interpret the misbehavior of a node is based on its responsiveness towards incoming route requests in terms of associated processing time, latency, threshold time duration. To facilitate the trust computation and respective decision, the enhanced version assigns the tasks to different functional components: Context Analyser, Event Analyser, Trust Manager, Trust Repository, Notifier, Decision Manager, Trust Engine and Node Manager. Our analysis and simulation results show the effectiveness of our proposal against wormhole attack in AODV.

Swarnali Hazra, S. K. Setua
Algorithms Based on Finite Automata for Testing of Omega-Codes

We establish an algorithm that, given as input a finite automaton recognizing a regular language

L

, decides whether

L

is an

ω

-code. In case the input is a non-deterministic finite automaton, the algorithm has time complexity

O

(

n

4

). In special case, if the input is a deterministic finite automaton, the time complexity of the algorithm is reduced to

O

(

n

2

), where

n

is the number of states of that automaton.

Thang Dang Quyet, Han Nguyen Dinh, Huy Phan Trung
An Opinion Mining Technique For Chinese Blogs

Nowadays blogs have gained popularity. They are of interest to researches in Information Retrieval. Many authors write opinions about things in their blogs. Opinion analysis in Chinese is a challenging task. In this paper, we discuss blog opinion analysis issues. We use blog documents provided by PIXNET (Taiwanese Internet service provider company) to do experiments. The proposed technique applies institute of computing technology, Chinese lexical analysis system (ICTCLAS) to segment the sentences, then utilizes the NTUS dictionary (National Taiwan university Sentiment Dictionary) to find opinion terms in every blog. After that, we use a support vector machine to define the opinions in the blogs. It detects both the positive and negative opinions in the selected blogs. The experiments demonstrate the promising results.

Yi-Ching Zeng, Vitaly Klyuev, Shih-Hung Wu
Graduation Project: Development of an Automation System for Filter Quality Test Using LabVIEW

This paper presents a system of automatic filter quality test for the filter activeness during the process of the filter production was embodied with LabVIEW server and conveyer system. The LabVIEW server is LabVIEWs function as web server which can be remote controlled during filter quality test through on web. The conveyer system is constructed with Conveyer, Network Analyzer and PC Camera. The LabVIEW server controls conveyer motor and sensor using DAQ card and controls Network Analyzer using GPIB card for measuring S parameter of filters. Moreover, PC camera is for monitoring the process of remote controlling during the filter test. And the data base construction from results of Network Analyzers measurement made possible to manage special information of filters.

Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim, Dongsik Kim, Ahn Dal, ChangWan Jeon, Sunheum Lee, Sangyeon Woo, HeungGu Jeon
Context-Awareness Middleware for Highly Reliable Application Services in Greenhouse

In this paper, we diagnose sensor or device failure or malfunctions occurring in the Ubiquitous Sensor Networks (USN) application system of a greenhouse with a sensor network applied to it and propose a failure-diagnostic context-awareness middleware that helps increase the reliability of services provided by the system. The proposed middleware consists of a data management module, context provider module, context analysis module, service module and information storage module and determines if there is any sensor or device failure by using a failure-diagnostic algorithm to compare and analyze data obtained from interactions between the modules. The implemented middleware was tested in terms of performance through a simulation. As a result, it could be predicted that the middleware would provide high performance in a large-scale system with multiple sensors.

Myeong Bae Lee, Yong Woong Lee, Ingon G. Park, Chul Young Park, Jang Woo Park, Yong Yun Cho, Chang Sun Shin
A Distributed and Intelligent Power Control Scheme in LTE-Advanced Femtocell Networks

In this paper, we propose an energy efficient power control scheme, called the

distributed and intelligent power control

(DIPC), to increase

downlink

(DL) system throughput and reduce energy consumption for

femtocell base station

(fBS) Tx power in the LTE-Advanced femtocell networks. In the DIPC scheme, a scheduler in each fBS allocates

resource blocks

(RBs) with optimal Tx power obtained by the requested data rate for each

femtocell

user equipment

(fUE). The simulation results show that the DIPC scheme outperforms the

conventional fixed power

(CFP) scheme which uses fixed Tx power in terms of system throughput for the

macro user equipments

(mUEs) and fUEs as well as energy consumption for fBS Tx power.

Byung-Bog Lee, Jaehak Yu, Se-Jin Kim
Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV

With the integration of wireless communication and pay-TV, mobile broadcast TV technologies have advanced noticeably in recent years. In 2011, Chen et al. proposed an efficient anonymous authentication protocol for mobile pay-TV and claimed that their protocol is secure and efficient using in mobile pay-TV systems. This paper shows that Chen et al.’s protocol has weaknesses in password guessing attack and impersonation attack with the assumption that attacker could get user’s smart card.

Hyun Sung Kim
RFID Antenna: Performance Analysis for Multimedia Services

A great interest is growing in the usages of RFID in multimedia applications and services. It is shown in the adaptation of major software companies such as Microsoft, IBM, and Oracle the RFID capabilities in their major software products. For example Microsoft SharePoint’s 2010 workflow is now fully compatible with RFID platform. In addition, Microsoft BizTalk server is also capable of all RFID sensors data acquisition. This will lead to applications that required high bit rate, long range and a multimedia content in nature. Higher frequencies of operation have been designated for RFID tags, among them are the 2.45 and 5.8 GHz. The higher the frequency means higher range, and higher bit rate, but the drawback is the greater cost. In this paper we present a single layer, low profile patch antenna operates at 5.8 GHz with pure resistive input impedance of 50 Ω and close to directive radiation with a BW of 30.57 %.

Ibrahim S. Alnomay, Jihad Y. Alhammad
Designing Medical Integra Interface with u-RPMS and HIS

We intend to design the interface for compatibility with HIS (Hospital Information System) by applying HL7 (Health Level 7) to u-RPMS (USN Remote Patient Monitoring System) system that collects the patients’ biometrics remotely and transmits them to smartphone finally. This means that the collected information of patients do not simply transmit to the remote site, but can be applied by the standardized system even when the patients visit the hospital. As the patients’ biometrics is also collected/processed though smartphone, we have designed them so that the efficiency of the medical institutions increases by the accurate and prompt provision of receipt and treatment.

Young-Hyuk Kim, Il-Kown Lim, Jae-Gwang Lee, Jae-Pil Lee, Jae-Kwang Lee
Minimizing Metadata Size for File Synchronization Using Variable-Length Chunking

A file synchronization program has to exchange lots of metadata information between a client and a server. As data have been growing rapidly in file synchronization systems, the metadata exchanging overhead is more critical now than before. In this paper, we propose a practical approach for minimizing metadata exchange overhead on the file synchronization system using variable-length chunking. The key idea is to minimize metadata by adapting file similarity information and generating only one hash key for several metadata. In the experiment, traditional file synchronization program sends 4.3 Mbyte over 500 MByte data file. However, the proposed algorithm only sends 37 Kbyte metadata.

Ho Min Jung, Jae Min Park, Chang Geun Song, Sun Jeong Kim, Se Hak Chun, Young Woong Ko
Cryptanalysis of An Identity-Based Strong Designated Verifier Signature Scheme

Kang, Boyd, and Dawson (Journal of Systems and Software, Vol. 82, 2009) proposed an identity-based strong designated verifier signature scheme which has a short signature size, and low communication and computational costs. In this paper, we show that this signature scheme does not satisfy the required authentication property. In particular, we present an attack that allows an adversary to impersonate the signer or designated verifier of a previously intercepted message-signature pair by forging valid signatures on arbitrary messages designated to one of them on behalf of the other.

Mohamed Rasslan
User-Centric Identification Management for Cross Realm Cloud and Ubiquitous Computing

User identification is undoubtedly important in cyber world. Traditionally, services use login name and password to verify a user. With the rising services of cloud and ubiquitous computing, it becomes a burden for users to memorize all their login name and password pairs for each service they need. Although the advance of new technologies brings us new authentication channels, the purpose of these technologies are for the service provider to be convinced the claimer is really who he or she claims. Few of them have ever concerned about user’s anonymity. In this paper, a novel credential based user-centric identification management based on the federated model is proposed. It satisfies the essential of user-centric and ubiquitous computing. Besides, the method keeps the user-centric consideration about anonymity. It supports all the anonymous, pseudonymous, and veronymous identity for user with single-sign-on.

Reen-Cheng Wang
Z-CRS: A ZigBee Cluster Reformation Scheme for Connectivity Enhancement

Based on the IEEE 802.15.4, ZigBee is designed for wireless sensor network and wildly used in many application areas. The tree routing protocol in ZigBee is simple and easy so that devices can participate using low resources. However, one of the problems is that nodes may be isolated due to constraints of configuration parameters when these nodes are randomly deployed. These nodes will lose connection and degrade the performance. The problem is discussed in some literatures but still has no optimal solution. In this paper, we propose a ZigBee Cluster Reformation Scheme (Z-CRS) to solve this problem. The scheme will improve the connectivity by choosing the best candidate isolated device to join. Thus, the join ratio can be increased and the network can be extended. The experimental results show that our scheme can reduce the isolated nodes more and the performance can surely be improved.

Reen-Cheng Wang, Ruay-Shiung Chang, Pu-I Lee
A Lock Screen Scheme with Improved Security and Convenience Using 8-Way Points for Smartphones

As the smartphone market rapidly grows, users are becoming increasingly interested in user interfaces in smartphones. Products using efficient and innovative interfaces are leading the market, and this tendency has greatly increased the competition in this sector. In the present paper, a lock screen scheme with improved security and convenience using 8-way points for smart devices is proposed.

Jae Yong Lee, Ji Soo Park, Ki Jung Yi, Jong Hyuk Park
NFC-LMS: Design and Implementation of Lost article Management System with NFC

NFC tags have been used in recent short-range wireless communications technology to send and receive information. In this paper, an NFC infrastructure is implemented, and smartphones equipped with NFC tags are shown to be able to obtain location information in cases of information theft or loss of goods using NFC-LMS. The paper also provides an analysis of current issues related to this field, and use case scenarios are discussed.

Il Ho Park, June Gyoon Lee, Ji Soo Park, Sung Joo Kim, Jong Hyuk Park
Differential Fault Analysis on the Block Cipher HIGHT

HIGHT, proposed in CHES 2006, is a block cipher standard approved by Telecommunications Technology Association (TTA) of Korea and ISO/IEC 18033-3. It is designed a lightweight block cipher suitable for restricted hardware environment. In this paper, we propose a differential fault attack on HIGHT with a small number of fault injections. The proposed attack can recover the 128-bit secret key with more than 4 faulty ciphertexts based on a random byte fault model. Our attack has O(2

32

) computational complexity and O(2

12

) memory complexity and is the first known differential fault attack on HIGHT.

Yuseop Lee, Jongsung Kim, Jong Hyuk Park, Seokhie Hong
Study on Development of Appraisal Business Performance Indicator

Today, the paradigm of the contents industry is fast changing like in, for example, convergence of contents, cloud computing environment, and diffusion of smart device supply. As a result, copyright competition is intensified day by day between the contents industries as well as between countries with the advent of “global cultural competition era”. As a result, copyright disputes are occurring and appraisal business to make judgments on such matters is increasing. In this study, we intended to look into the concept of performance indicator and the method to approach it in order to develop a balanced score card based performance indicator as a criterion to measure whether organizational missions, strategic goals or performance goals of appraisal business have been accomplished or not, and to develop performance indicator of appraisal business for public organizations performing appraisal businesses using the balanced score card based method.

Yanghoon Kim, Jonggu Kang, Youngsub Na, Hangbae Chang
An Efficient Method of Extracting Strings from Unfixed-Form Data

As all the society becomes computerized, there increases computerized data, and for digital forensic investigations, there is a great deal of unfixed-form data collected, whose exact forms are difficult to figure out, such as physical memory or page files. The most efficient method for investigating unfixed-form data is to extract strings. In case of document files, strings extracted from unfixed-form data come to include contents of the relevant documents, and in case of physical memory or page files, they can even include passwords that users have entered in addition to traces of users’ using a messenger or a web page. Although extracting strings plays an important role in investigating unfixed-form data like this, the present method of extracting string includes a number of meaningless strings, while being carried out without considering the Unicode environment properly. Accordingly, this thesis intends to suggest a way of excluding meaningless strings effectively while considering the Unicode environment during the process of extracting strings.

Sangjun Jeon, Jungheum Park, Keun-gi Lee, Sangjin Lee
Forensic Analysis of Android Phone Using Ext4 File System Journal Log

As announcing Android OS 2.3, Gingerbread, Google changed the existing file system, yaffs2 to ext2 and adopted it as official file system in android phone. Ext4, the most widely used file system in Linux, not only assists large, but also provides fault tolerance through journaling function by adopting JFS—journal file system. In journal log created through journaling function of ext4, every transaction occurred in file system is record. All transactions include all events (e.g., creating, deleting, and modifying). Therefore, analyzing journal log, we would know what file did android user access to; could recover deleted files as finding the information of previous status of them. Moreover, we could also analyze user actions if we make up timeline by utilizing timestamp recorded in journal log. Based on these facts, in this paper, we aim to analyze journal log area in ext4 file system; to develop the tool, JDForensic, that extracts journal log data to recover deleted data and analyze user actions. This tool will be usefully utilized in the first time digital forensic investigation of android phone.

Dohyun Kim, Jungheum Park, Keun-gi Lee, Sangjin Lee

Futuretech 2012 - ISCC 2012 workshop

A Study on Performance Evaluation of 7-Step QRcode Authentication Framework

This thesis designed QRcode authentication framework with 7 steps, and especially proposed ‘Stepwise Dimensional Ascending Algorithm’. The stepwise dimensional ascending algorithm for QRcode authentication framework is described as follows: in step 1, space filling curve algorithm making one dimensional sequence and neighboring cells are bound together; in step 2, a two dimensional array is comprised; and in step 3 is ‘Layer’ work processed. In other words, three-dimensional sequence is made by Z-Order. In order to perform comparison analysis on the currently used authentication systems and the proposed one, each authentication technique on the Android OS environment was implemented for a test. The test result showed that just as the original study purpose of QRocde authentication system, the proposed technique made mobile devices less consume system resources, and that, regarding network traffic volume between mobile devices and a server and the time necessary for authentication in a server, the proposed technique’s performance is as same as or better than encryption method and mobile OTP method.

Dong-Sik Oh, Bong-Han Kim, Jae-Kwang Lee
ADL-Driven Simulator Generation for Energy Dissipation Tracing and Monitoring

Reducing energy consumption has become an important issue in designing hardware and software systems in recent years. To address this important issue, hardware designers focus on power-efficient component designs such as new cache architectures, new data-path designs, and pipeline gating techniques. Therefore, It is very important research area for embedded software developers to measure and trace of energy consumption on the simulator. The ADLs are used to specify processor and memory architectures and generate a SDK including compiler, simulator, assembler, and debugger. In this paper, we design and implement an ADL-driven simulator for energy dissipation and monitoring. To accomplish our research objectives, Firstly, we describes the energy consumption estimation and monitoring information on the extended EXPRESSION ADL. And then, we generate the energy monitoring library which construct retargetable energy dissipation simulator with general performance library modules. Finally, we represent the energy estimations experimental results for MIPS R4000 ADL description.

Kwangman Ko
Public Key Infrastructure of Using the Fingerprint Information in Electronic Bidding System

In the electronic bidding system, the user authentication uses the PKI technology of the password-based. In the case of the password-based PKI technology, because it protects by using the password which is easy that user memorizes the private key, he has the problem about the password exposure. If the user fingerprint information is used, the user authentication in which the security is strengthened than the existing authentication technology can be done. Therefore, in this paper, we had designed and developed the electronic bidding system which it uses the fingerprint information, it stores the user fingerprint information and certificate in the fingerprint security token and can authenticate the user.

So-A Park, Yeon-Chil Oh, Young-Hyuk Kim, Il-Kown Lim, Jae-Kwang Lee
A Seamless Multimedia Service in Wireless Network

This paper presents a seamless multimedia service in WLAN. In this paper, the environment of WLAN for seamless video service consists of a switching agent (SA), some access points (AP) and mobile nodes (MNs). The SA supports handover mechanism for MNs when they move one AP to another, and retransmits video streams from video server to the requesting AP. The proposed handover mechanism needs additional 2-byte as IP header which is used for an identification number (ID#) of AP that the MNs are joined. The SA changes the path of successive video streams using the ID# generated when the MN moves to a specific AP. The proposed system can support seamless video service without cutoff and reconnection to video server according to the handover.

Seongyeol Lee, Iksoo Kim, Jeonghoon Park, Yoseop Woo
Efficient Soft-Output Demapping Method for MIMO-OFDM WLAN System

In this paper, a simplified soft-output demapping method is proposed for a coded MIMO-OFDM Wireless LAN system, only requiring 3-bit soft information. In particular, we apply bit-rounding and effective-bit threshold adjustment techniques, in order to effectively extract 3-bit soft information without performance degradation.

Chanho Yoon, Hoojin Lee
A Study on Creative Engineering Design for Convergence Education Using Rube Goldberg Device

This study aims to present design class measures to foster the convergence talents through the students’ creativity improvement and convergent education through consilience in the creative engineering design subject class of the engineering college. To achieve this goal, the survey was carried out based on the students who took the creative engineering design subject, 88 % students wanted to introduce the Rube Goldberg device production project in the design process, and the Rube Goldberg device project which they wanted to carry out was ‘LED lighting.’ Based on the results, the creative engineering design project performance completed and estimated 1 structures for given task, but in this study, STEAM was applied to the existing creative engineering design project as the convergent education action plan so new creative design task and education process using Rube Goldberg device project as the combination of the mechanical mechanism was suggested.

Sang-Soo Yeo, An-Na Kang, Sang-Cho Chung
Evaluation of University Online Classes Compared to Offline Classes: Perceived Satisfaction and Fidelity

In this paper, students of M university in Daejeon have been surveyed in an effort to verify the differences in perceived satisfaction and fidelity of online classes as compared to major and non-major offline classes. Based on survey data from 1,045 participants, perceived and relative significance of satisfaction and fidelity to online classes according to demographic variables such as sex, academic year, and college to which the student belongs have been evaluated. The results indicate that perceptional degree of satisfaction and fidelity to major, non-major, and online classes is descriptively important. The findings indicate that the perceived satisfaction and fidelity to major classes are highest, while perceived satisfaction to non-major classes is lowest. Perceived satisfaction to online classes takes an intermediate place between the satisfaction levels of major and non-major classes, but perceived fidelity to online classes is lowest. Also, the findings indicate that demographic differences in perceived satisfaction and fidelity to major, non-major, and online classes exist in some categories. School year differences in perceived satisfaction and fidelity to major and non-major classes are found. Statistical significance according to sex, school year, and attending college is not found in perceived satisfaction and fidelity to online classes. Meanwhile, we found meaningful differences in perceived satisfaction to non-major classes and in perceived fidelity to major classes among school years. Also, we found a significant difference in perceived satisfaction to major classes according to attending college.

Sang-Zo Nam
The Multi-object Tracking Based on Gradient and Depth Information in the Stereo Vision

The multi-object tracking method was proposed in this paper effectively using stereo vision. For the multi-object tracking, we present the method to combine the local gradient patterns (LGP) and the depth information for extracting the feature of region of interest (ROI) by the stereo camera. We used the LGP algorithm to get the feature of ROI, and used the difference of depth information between objects to solve the occlusion problem caused the multi-object tracking. Therefore in this paper, the algorithm suggested that the location and size of detected object using background modeling are assigned automatically. Through this experiment, our proposed method is implemented that it performs more precisely than existing methods.

Hye-Youn Lim, Young-Deuk Moon, Dae-Seong Kang
Prediction System of the Situation Using the Fast Object Detection and Profiling

Background modeling of image segmentation is the most important role to image analysis and interpretation. Background modeling methods can be divided into the adaptive median filtering (AMF) and Gaussian mixture model (GMM). In this paper, we proved the superiority of AMF performance through comparison of GMM. In the first, background modeling that is based on GMM and the AMF compared to the performance in order to detect object by segmentation. AMF background modeling selected with performance measures is used to object detection. AMF modeling has demonstrated superior method than conventional methods through specific predefined conditions by profiling.

Sang-June Park, Young-Deuk Moon, Dae-Seong Kang
PAPR Estimation of HC–OFDM in Dispersive Fading Environments

Previous research dedicated to peak to average power ratio (PAPR) reduction introduced a Huffman coding technique that provided a decrease of 3–4 Db of the PAPR, which is a major problem in orthogonal frequency division multiplexing (OFDM) technique. In this paper, PAPR estimation among short-term fading channels has been proposed and simulation results are superimposed.

Sang-Soo Yeo, Heau-Jo Kang
Implementation of Extendable n-by-n FUA and Its Performance Analysis for Transform of H.264/AVC

In this paper, we present the extendable FU array consisting of single FU for transform in H.264/AVC. The paper highlights the design of FU array which can accommodate the operation block of various sizes. We implemented the 9-by-9 FU array processor, some experiments are conducted so as to verify the architecture, and proposed extendable n-by-n FU array can accommodate the operation of various sizes including MPEG-1/2/7/21 and H26x and can be extended to n-by-n FU array that will give a scalability feature to coding tools of H.265/HEVC.

Ki-Hong Park, Won-ki Ju, Yoon-Ho Kim
A New Approach to Digital Assets Management System after Death of a User

Recently, use of individual cyber space such as social-network service is increasing rapidly. User can display his virtual life and express various characters. And he can more sharing individual’s inclination, personality, and dilettante life etc. But when social-network user died, he doesn’t arrangement his social network services. So, user’s household or successor must be arrangement user’s used social network service and owned digital assets against of user. In this time successor want to need more easy and efficiency about to manage a dead user’s digital assets arrangement. They want to delete or modify or management dead user’s digital assets. But, Facebook, Twitter, Flicker, YouTube, Paypal that very popular social network services is very difficult to digital asset management. For example, if Facebook social network used user dead, than his successor must be connect Facebook inc. And he checks information for his dead family and send user’s death truth to Facebook administrator. Next, Facebook administrator verify to user’s death information by trusted government organization. And accept to successor’s requests. As well as, some successor is very difficult to delete, modify, or stop to boarding a text on web site. So, we propose ADAM (A new approach to digital asset management system after death of a user). It can successor will be more easy, efficiency, and safe to access a dead user’s digital asset at once. It makes use of existent user certification system and token techniques, because mutual authentication on various social-network services site will use to successor, and successor easy handling dead user’s digital asset. If successor may don’t know identification or something of dead user’s, he can manage the dead user’s digital assets. We will investigate and explain that ADAM can support to convenient, safe, and efficient.

Jin-Mook Kim, Hwa-Young Jeong, Sang-Soo Yeo

Futuretech 2012 - MPCA 2012 workshop

An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things

Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node’s prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.

Wenmao Liu, Lihua Yin, Binxing Fang, Xiangzhan Yu
RESTful Web Service Composition

RESTful web services are becoming more popular with the explosive use of smartphone applications. Computing capability of smartphones is generally less powerful than other mobile computing devices. Therefore, it is necessary to offload the computation-intensive part by careful partitioning of application functions across the cloud computing. For this purpose, we make use of RESTful web service. Since, we are not able to make all necessary data within local storages for smartphone applications, because we should access the data from third party servers or vendors. For example, navigation, oil/gas price, public transportation information. So, we propose a novel methodology for accessing the information by RESTful web service composition. The core technology of our methodology is based on automatic conversion between web service and object. The proposed system automatically converts the web service execution result to objects in order for deverlopers to easily compose several web services by using this web service composition service. The result shows that our mobile cloud computing platform performs better as increasing number of cloud nodes.

Min Choi
Implementation of Map Reduce Model for Disk Forensic Computing Analysis

Cloud computing has become one of the most transformative developments in the computing environment since last a few years. In the cloud computing and forensic, cloud storage is one of the most interesting targets for digital evidences. In this paper, we develop the design and implementation of MapReduce programming model for digital forensic computing and analysis in the cloud storage computing environment. In our implementation, the cloud storage is composed of Hadoop Distributed File System (HDFS) that was developed as an open source implementation of the Map&Reduce programming model. Based on the Hadoop distributed cloud storage, we investigate several Map&Reduce model. By doing this, the forensic analysis can be efficiently labeled, acquired, and analyzed.

Seung-Ho Lim
Management Server Architecture for REST Web Service Composition

RESTful web service are becoming more popular with the explosive use of smartphone applications. Thus, we propose the concept of management server for composed RESTful web services. Due to limited resources of smartphone computing platforms, we are not able to make all necessary data within a smartphone, we should access the data from third party servers or vendors instead. To improve processing efficiency, we need to access information with RESTful web service in a composed way. That means we do not have to access two or more REST web services in serial, but we just access a composed web service only once through a powerful cloud computing server. Our management server framework dynamically launches the binds converted objects in order for developers to easily deploy their web service without physical server. Experimental result shows that our server outperforms conventional approaches.

Min Choi, Wonjae Lee

Futuretech 2012 - NAMP 2012 workshop

Analysis of Irregular Penetration of Laser Weld

Keyhole is narrow and deep weld shape when the high power density energy such as laser or electron beam is applied as heat source for welding. Spiking defect which means irregular partial penetration depth is a typical defect in theses processes. It can be understood as the keyholes stand in line irregularly. And it should be avoided because it is bad weld quality in itself and is cause of crack due to concentrated stress on the keyhole root. In the author’s previous research, spiking defect is analyzed through image processing and basic chaos theory. It is shown that the irregularity of penetration can be quantified as numbers as result. Addition to this, the degree of chaotic behavior of penetration pattern is visualized for enhanced intuitive comprehension through phase plot of penetration depth data in this research.

Jung-Ho Cho
Laser Beam Scattering Analysis Inside Porous Materials by FEM

Laser beam scattering is an important issue in porous materials like ceramic powder or nanofibers. To understand its optical characteristics an integrating sphere and DAQ system was used and the scattering and absorption phenomena were studied. 21 flux Richard–Mudget theories were used to understand the composition of scattering and absorption coefficient in extinction coefficient. In this paper, the detail theory of scattering measurement and analysis of scattering and absorption coefficient in porous material is presented by using Matlab and COMSOL multiphysics results. The detail experiment setup and results are explained.

Hae Woon Choi
Microstructure Predictability by Voronoi Diagram

Voronoi diagram is one of the most well-known space decomposition methods and there are numerous application examples in various fields across science, technology and art. For given space and fixed points, it divides the space according to very simple rule of which cutting line or plane is placed equally from each point. Partitioned Voronoi cells exceedingly resemble cell structure of organic tissue. And it can be also regarded as microstructure of metal with some expanded imagination. Therefore, in this research, the author investigated the possibility of using Voronoi diagram technique as a prediction tool of metal’s microstructure.

Jung-Ho Cho
The Method to Measure Heart Motion Data of Animal for Medical Robotic Research

This paper presents a method to measure heart motion data of animal model in vivo. In medical robotic research, collecting experimental motion data is an important work to validate a new instrument or control algorithm. Sonomicrometry system is installed inside of the heart and piezoelectric crystals are placed using the suggested sensor plate. Distance between two crystals is recorded and 3-D positional data is calculated with six crystals. Five crystals are placed on the plate and one crystal is attached on surface of the heart. The balloon filled with medium is placed between plate and one moving crystal is sutured at the target point to transmit ultrasound signal from moving one to five fixed crystals. Normal beating, arrhythmia, and heart rate changing cases are considered in this test.

Myun Joong Hwang

Futuretech 2012 - SEE 2012 workshop

Simulation Analysis on BER Patterns Based Maritime Ad-hoc Networks

Shipbuilding is one of the major export industries of Korea, it has been occupied the top spot in world markets. It is not easy work to keep prestige up. It is necessary to develop the technologies of ship and IT convergence to strengthen competitive and to achieve sustainable growth. Wireless ad-hoc mesh network in sea environments is one of the important parts of ship and IT convergence. In this paper, the architecture of wireless maritime network communication is presented based on Wimax and the idea to simulate wireless communication on sea using Qualnet simulator is shown. We describe Bit Error Rate (BER) levels according to sea status, affects physical layer of wireless communication. BER patterns are designed using MATLAB.

Nam-Sik Yun, Yoon-Young Park, Kang-Hee Jung, Byung Tae Jang, Dong Sun Lim, Jae Myoung Kim
A Study on Open Cloud Platform Based on Intelligent Application Development Studio

Future smart technology is predicted to develop and also create various services. However, majority of the infra service, platform service, and software service are highly dependent on foreign products. Accordingly, this paper developed the Korean Cloud system through the development of “Open Cloud (Platform) System-Based Integrated Intelligent Application Development Studio” which is an open source software-based, and developed various open source software based services.

Jae-In Sin, Jaekyung Kang, Sun Myung Hwang
A Study on Maturity Level for Open Source Software

This paper is intended to proposal maturity level of open source software (OSS). There are many difficulty factors that cause the OSS problems during software interoperation. This paper evaluates the efficiency of maturity level that reliable OSS.

Eun-Ser Lee
Linux Based Real-Time Feature Supporting Method and Evaluation for Information Devices

Recently, demands of information devices are increasing as we can find so many information devices around us such as smartphone, mobile internet device (MID), tablet. These characteristics of information devices services should support soft real-time based time guaranteed multimedia services and control internet appliances. In this situation, soft real-time supported system should be developed to consider as a total aspect of hardware, kernel, middleware, application. But this paper will describe soft real-time supporting and evaluation methods for information device as an aspect of only kernel.

YungJoon Jung, Donghyouk Lim, ChaeDeok Lim, Eun-Ser Lee
An Agricultural Expert Cloud for a Smart Farm

In agricultural environments, know-how and experience of skillful agricultural experts, who may are farmers, researchers, market analysts, distribution specialists, and so on, have been more important roles than ever. Especially, for farmers newly trying to cultivate a high value crops, the knowledge and the experience of experts for the crops will be very important factors for successful cultivation. So, for higher productivity and better quality, the valuable information has to be able to be supplied easily and quickly to a user in agricultural environments. Cloud computing technologies may suggest a potential service model to do that through Internet and various state-of-edge technologies based on IT. In this paper, we introduce a service model based on an agricultural expert Cloud to support a smart farm service in ubiquitous agricultural environments. The introduced service is based an expert system, in which the knowledge and the experience of the various fields related in agriculture is accumulated. So, by easily gaining the valuable knowledge and experience about a specific crop through the expert Cloud, a user can efficiently and successfully cultivate any crops in ubiquitous agricultural environments.

Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park, Eun-Ser Lee
An Intelligent Service Architecture Based on Community Computing

Recently, there is an increasing interest in community computing in many different business areas. Especially, there have been many researches about a cooperative service model or a smart service model based on a community concept through various social network services. In this paper, we propose an intelligent service architecture based on community computing environments to supply a smart service. The introduced service architecture consists of hierarchical several community layers, in which various services and resources can cooperate with each other through community networks in order to offer a proper service which a user wants to be served by. Through the suggested service architecture, a user can easily design an intelligent service model and quickly implement it for various fields based on community computing.

Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park, Eun-Ser Lee
Get-Me-Out Puzzle as One Player Reachability Game

Get-Me-Out puzzle can be regarded as one player reachability game. And one player reachability game can also be regarded as model checking problem. Using this transitive relation, the puzzle can be solved with state-of-the-art model checking tool. This paper presents the problem formulation of the puzzle as a transition system and then transforms the transition system to an input model with model checking tool. In this way, the most difficult level of the puzzle, Expert Level 2,000, is solved in a few minute. This paper contributes to educations such as software engineering (e.g. modeling), formal verification (e.g. model checking), and game theory (e.g. controller synthesis).

Gihwon Kwon

Futuretech 2012 - SocialComnet 2012 workshop

A Microscopic Study on Group Dynamics of the Tencent-Microblogs

Studying group dynamics or evolution is an appealing research topic in the area of social networks. In this paper, we have studied a novel problem of predicting social states of the groups in Tencent-microblogs at the level of nodes. A

K

-history model, which takes three historical factors of the past

K

time slices into consideration, is proposed to predict each user’s future state. To evaluate the proposed model, we have crawled data about groups from Tencent-microblogs. Experimental results on four data sets have shown that the model is more effective in predicting accuracy by taking more historical data into consideration.

Zhongying Zhao, Yong Zhang, Joshua Zhexue Huang, Shengzhong Feng, Jianping Fan
A Novel Opinion Analysis Scheme Using Social Relationships on Microblog

A novel scheme that employs content of posts and social relationships to analyze user opinion on microblog is proposed in this paper. Unlike traditional approaches focus on posts, this research regards user as an analysis unit to investigate sentiment classification on a specific topic. In aspect of textual sentiment classification, opinion of posts is classified with Bayesian or LibSVM tools. In addition, two types of social relationships (friends and fans) are adopted to construct an indirect graph of social network separately. The aim of this paper is to leverage user neighbors to overcome the challenge that posts are often too short and ambiguous to analyze opinions. Simultaneously, we deeply consider influential degree through interactions between two humans. In our experiment, Plurk, a popular microblog in Asia is employed as resource to achieve topic-dependent opinion analysis.

Meng-Hsuan Fu, Ling-Yu Chen, Kuan-Rong Lee, Yaw-Huang Kuo
Computing Event Relatedness Based on a Novel Evaluation of Social-Media Streams

The “microblogs” archives keep a valuable collection of records for past disastrous events and related stories. To learn the experiences from past microblogging messages for coping with emerging real-world events, in this work we utilize the social-media messages to characterize events for relatedness analysis. First, we established an online clustering algorithm to detect burstiness on Twitter microblogs for monitoring large-scale events. Furthermore, we compared the features extracted from the on-going event with the ones of other past detected events. Through the developed algorithms for computing event relatedness the ranking of related events can be sorted, allowing for predicting possible evolution and impacts of the event. For performing event clustering and relatedness computation, in this work we have developed an online system platform that can immediately evaluate the significantly emergent events to achieve the goals of real-time discovery of disastrous information and early warning for crisis management.

Chung-Hong Lee, Chih-Hong Wu, Hsin-Chang Yang, Wei-Shiang Wen
A Requirements-Driven Approach Towards Decentralized Social Networks

A new generation of distributed social networks is promising to give back users full control over their personal information as shared in private and business life. However, there are many aspects to this control, such as information ownership, access to third parties and limited persistence. This paper compares various existing solutions against an analytically elaborated list of user requirements. Based on this comparison, we also present a comprehensive and integrated approach to overcome the major issues outlined for the existing solutions, including first experiences of applying the reference implementation.

Simon Thiel, Mohamed Bourimi, Rafael Giménez, Simon Scerri, Andreas Schuller, Massimo Valla, Sophie Wrobel, Cristina Frà, Fabian Hermann

Futuretech 2012 - DFIS 2012 workshop

Silhouette: Volume Shadow Copy Analyzer

The Volume Shadow Copy Service is a backup infrastructure provided by Windows that creates point-in-time copies of a volume. Windows Vista and later versions use the service instead of the earlier restore point feature. Whereas the restore-point feature logically copies and stores specified files, Volume Shadow copies and stores only data that change in the volume. In a live system, Volume Shadow copies can be checked and recovered through commands provided by the system, but it is difficult to analyze files stored in the Volume Shadow copies of a dead system, such as a disk image, because only changed data are stored. Hence, this study analyzed the structure of Volume Shadow Copy files that are logically stored. This analysis confirmed the locations of changed data and original copies by identifying a structure that stores the file data stream to file system metadata. On the basis of our research, we propose a practical application by developing tools that enable recovery of snapshot data stored within Volume Shadow Copy files; we also present a successful case study.

Jewan Bang, Sangjin Lee
New Approach to Anonymity of User Information on Social Networking Services

Users often share same text information for friends in different level groups on social networking services (SNSs). Moreover, it does not identify a person who has revealed the text. Some approaches overcome this problem by using anonymity text, but most methods for doing this has focused on databases. However, information about a user in SNSs is generally conveyed in sensitive phrases. Therefore, we developed the algorithm for automatically generalizing sensitive phrases. The generalized phrases are quantified by a precision metric to ensure that an appropriate level of privacy is used for each group. The algorithm then automatically creates synonyms for the generalized phrases for use in detecting disclosure. An application using the algorithm was implemented for controlling the posting of information on Facebook.

Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen
Cloud Digital Investigations Based on a Virtual Machine Computer History Model

In several traditional digital investigations, several forensic frameworks have been proposed. The selection of a suitable forensic framework for the cloud computing virtual environments further challenges the existing digital forensics space, as no conclusive generic framework exist that inclusively supports or can work for any cloud computing digital investigations. To solve this problem for the data cloud logical domains, this paper describes a model of using the computer’s virtual machine history based on finite state machine (FSM) automata theory. The model can be used to define the theory of a virtual machine (VM) cloud computing digital investigation allowing one to set the stage for prescribed applications operating within these abstract domains. The paper summarizes the theoretical concept used by the virtual machine hypervisor kernel logs that map the ideal and inferred VM history to the set of corresponding low level primitive states and events of the VM hosted computer environment.

Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir
Differential Fault Analysis on Block Cipher LED-64

LED-64 is a 64-bit block cipher proposed in CHES 2011 and suitable for the efficient implementation in constrained hardware environments such as WSN. In this paper, we propose a differential fault analysis on LED-64. In order to recover the secret key of LED-64, this attack requires only one random nibble fault and an exhaustive search of 2

8

. This work is the first known cryptanalytic result on LED-64.

Kitae Jeong, Changhoon Lee
Stimuli for Gaze Based Intrusion Detection

User authentication is an important and usually final barrier to detect and prevent illicit access. Nonetheless it can be broken or tricked, leaving the system and its data vulnerable to abuse. In this paper we consider how eye tracking can enable the system to hypothesize if the user is familiar with the system he operates, or if he is an unfamiliar intruder. Based on an eye tracking experiment conducted with 12 users and various stimuli, we investigate which conditions and measures are most suited for such an intrusion detection. We model the user’s gaze behavior as a selector for information flow via the relative conditional gaze entropy. We conclude that this feature provides the most discriminative results with static and repetitive stimuli.

Ralf Biedert, Mario Frank, Ivan Martinovic, Dawn Song
Backmatter
Metadaten
Titel
Future Information Technology, Application, and Service
herausgegeben von
James J. (Jong Hyuk) Park
Victor C.M. Leung
Cho-Li Wang
Taeshik Shon
Copyright-Jahr
2012
Verlag
Springer Netherlands
Electronic ISBN
978-94-007-4516-2
Print ISBN
978-94-007-4515-5
DOI
https://doi.org/10.1007/978-94-007-4516-2