IT Convergence and Security 2012Kuinam J. Kim, Kyung-Yong Chung The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security. |
Contents
3 | |
12 | |
21 | |
29 | |
35 | |
43 | |
51 | |
52 | |
76 MultiHop Relay Protocol Techniques for Performance Enhancement of LTE Downlink System | 633 |
77 Performance Improvement Using Single CarrierFDMA in Relay Based LTE Uplink System | 645 |
78 An Efficient HighSpeed Traffic Control Scheme for RealTime Multimedia Applications in Wireless Networks | 656 |
79 Interference Assessment on the Circuit Domain in GSMR Networks by Grey Clustering and Analytic Hierarchy Process | 667 |
80 Design of Transducer Interface Agent and its Protocol for WSN Middleware | 676 |
81 Collaboration of ThinThick Clients for Optimizing Data Distribution and Resource Allocation in Cloud Computing | 685 |
82 Mutual Exclusion Algorithm in Mobile Cellular Networks | 695 |
83 An Effective Personalized Service Provision Scheme for Ubiquitous Computing Environment | 703 |
61 | |
9 A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme ARS | 71 |
10 Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment | 79 |
11 A Study About Security Awareness Program Based on RFID Access Control System | 86 |
12 A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method | 93 |
13 An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management | 101 |
14 Designing a Model for Context Awareness Based Reliable AuctionRecommending System CARARS by Utilizing Advanced Information | 111 |
Part III Security Protocols and Applications | 119 |
15 A Secure SelfEncryption Scheme for Resource Limited Mobile Devices | 120 |
16 A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value | 131 |
17 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks | 141 |
18 An IdentityBased Ring Signcryption Scheme | 150 |
19 A Secure DSCDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks | 159 |
20 A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent | 168 |
21 Internet Anonymity in Syria Challenges and Solution | 177 |
Part IV Convergence Security | 187 |
22 Comparison of Attacks and Security Analyses for Different RFID Protocols | 188 |
23 Honeypot Using Dynamic Allocation Technique with IP Scan | 197 |
24 AttributeBased Encryption for Commercial Content Distribution | 205 |
Part V IT Convergence Applications | 214 |
25 Sensibility Extraction for Bicycle Design Using RFID TagAttached Crayons | 215 |
26 Efficient Handover Schemes for Railroad Communications in 4G Mobile Networks | 225 |
27 Cyber Threat Prediction Model Using Security Monitoring System Event | 233 |
28 A Study for Car Insurance Service Using Vehicle Real Time Information | 241 |
29 An MMU Virtualization for Embedded Systems | 247 |
30 The Design and Implementation of Start Stop System with MultiProtocol in Automotive Smart Key System | 253 |
31 The Design and Implementation of Improved AntiCollision Algorithm for Vehicle User Authentication System | 260 |
32 MultiPort Register File Design and Implementation for the SIMD Programmable Shader | 267 |
33 Design Exploration Technique for Software Component Mapping of AUTOSAR Development Methodology | 273 |
34 Interoperability and Control Systems for Medical Cyber Physical Systems | 282 |
35 Ubiquitous Logistics Management in the Steel Industry | 293 |
36 Performance Evaluation of Train Propulsion Control on Ethernet Network Using TrueTime | 301 |
37 Intelligent Control System for Railway Level Crossing Safety | 308 |
38 Moving Average Estimator Least Mean Square Using Echo Cancellation Algorithm | 319 |
39 An Abrupt Signal Detection as Accident Detection by Hamiltonian Eigenvalue on Highway CCTV Traffic Signal | 325 |
40 Implementation of Improved DPD Algorithm Using the Approximation Hessian Technique and an Adaptive Filter | 334 |
41 An InGaP HBT MMIC High Efficient Dual Path Power Amplifier for CDMA Handset Application | 343 |
42 UHealth Platform for Health Management Service Based on Home Health Gateway | 351 |
43 A 2D Visual Model for Sasang Constitution Classification Based on a Fuzzy Neural Network | 357 |
44 Graph Coloring Algorithms and Applications to the Channel Assignment Problems | 363 |
45 Thermal Performance in Ecological Korean House | 371 |
46 An Automatic Roof Frame Design Method for Korean Traditional Wooden Architecture | 377 |
47 Adaptive Load Partitioning Algorithm for Massively Multiplayer Online Games | 383 |
48 GameBased Learning System Using GraduatedInterval Recall Method | 393 |
49 An Efficient DRAM Converter for NonVolatile Based Main Memory | 400 |
50 An M2MBased Interface Management Framework for Vehicles with Multiple Network Interfaces | 409 |
51 A Framework of the Wireless Sensor Based Railway Signal System | 417 |
52 Evolutionary BioInteraction Knowledge Accumulation for Smart Healthcare | 424 |
53 A NonVolatile Buffered Main Memory Using PhaseChange RAM | 433 |
54 A Study on the RealTime Location Tracking Systems Using Passive RFID | 441 |
55 SmartKeyboard for the Disabled in Smartwork | 449 |
56 Addressing the Outofdate Problem for Efficient Load Balancing Algorithm in P2P Systems | 458 |
57 Unified Performance Authoring Tool for Heterogeneous Devices and Protocols | 481 |
58 Discrimination System of Surround Illumination Using Photo Sensors Output Voltage Ratio | 488 |
Computer Access Assessment System KCAAS for Persons with Physical Disabilities | 499 |
60 Color Coding for Massive Bicycle Trajectories | 508 |
61 UserOriented Load Balancing Scheme for MMORPG | 515 |
A Single Interface Based File Sharing System | 521 |
63 Feature Reduction and Noise Removal in SURF Framework for Efficient Object Recognition in Images | 529 |
64 Automatic Segmentation of Region of Interests in MR Images Using Saliency Information and Active Contours | 536 |
65 Digital Image Magnification Using GaussianEdge Directed Interpolation | 545 |
Part VI Mobile Computing and Future Networks | 553 |
66 An Examination of Psychological Factors Affecting Drivers Perceptions and Attitudes Toward Car Navigation Systems | 555 |
67 Handover Performance Evaluation of 4G Mobile Networks | 563 |
68 An Emergency Message Broadcasting Using Traffic Hazard Prediction for Vehicle Safety Communications on a Highway | 568 |
69 Detecting SIM Box Fraud Using Neural Network | 575 |
70 OverlappingNode Removal Algorithm Considering the Sensing Coverage of the Node in WSN | 583 |
71 Implementation of the Personal Healthcare Services on Automotive Environments | 589 |
72 A Design of WSN Model to Minimize DataCentric Routing Cost for ManytoMany Communication | 597 |
73 Improving of Cache Performance using Trust Value of Nodes | 605 |
74 Design of Microstrip Patch Antenna for Mobile Communication Systems Using SingleFeed | 613 |
75 Microstrip Patch Antenna on UHF Band Using Multiple Meander for Metal Attached in UCity | 622 |
84 Fast Data Acquisition with Mobile Device in Digital Crime | 710 |
RemotetoRemote Transfer Protocols and Methods | 719 |
86 The Stack Allocation Technique on Android OS | 727 |
87 New Load Balancing Method for VoD Service | 733 |
88 Exploiting MobilityTraffic Characteristics for PMIPv6Based Distributed Mobility Management | 743 |
89 A MultihomingBased Vertical Handover Scheme | 749 |
90 A Performance Prediction Model of Parallel DCT on Mobile Embedded Systems | 755 |
91 Implementation of a Low Cost Home Energy Saver Based on OpenWrt | 761 |
Part VII Multimedia and Information Visualization | 766 |
92 A Multimedia Authoring and Virtual Collaboration System Supporting MultiConferences for ELearning | 769 |
93 An Immersive Ski Game Based on a Simulator | 777 |
94 A Method of Combining Gaussian Mixture Model and KMeans for Automatic Audio Segmentation of Popular Music | 786 |
95 Human Action Classification and Unusual Action Recognition Algorithm for Intelligent Surveillance System | 797 |
96 Design of Configurable Pin Control Block for Multimedia SystemonaChip | 805 |
97 Depression and Fatigue Analysis Using a MentalPhysical Model | 813 |
98 A Study of Nonphotorealistic Rendering Method Using Orientation Sensor in Mobile Devices | 819 |
99 A BCI Contents Development Method Based Templates | 828 |
100 PenInk Rendering for Traditional Building Images | 837 |
101 ContextAware Statistical Inference System for Effective Object Recognition | 842 |
102 Adaptive Skinny Smudge Tool | 853 |
103 Modeling Students Handwritten Examination Data and Its Application Using a Tablet Computer | 861 |
104 Advanced Media Measuring Method Using MPEG2 Transport Stream for High Quality Broadcasting Management System | 866 |
105 Proposed Media Signal Sharing Scheme Through NGN for Service Overlay Multimedia Framework | 873 |
106 Realtime Sport Analysis Methodology for Extracting Target Scenes on Mobile Environment | 881 |
107 A Cost Effective Method for Matching the 3D Motion Trajectories | 889 |
108 Perceived Quality Model for Supporting Full Session Mobility in Multimedia Service Delivery Process | 896 |
109 A Study of Stereoscopic 3D Technology Development Trends on Mobile | 905 |
110 Efficient Object Recognition Method for Adjacent CircularShape Objects | 911 |
Part VIII Convergence Data Mining and Artificial Intelligence | 918 |
111 Improved View Selection Algorithm in Data Warehouse | 919 |
112 A Novel Weighting Technique for Mining Sequence Data Streams | 929 |
113 Analyzing Efficient Algorithms of Frequent Pattern Mining | 937 |
114 Efficient Isomorphic Decision for Mining Sub Graphs with a Cyclic Form | 947 |
115 Performance Evaluation of Approximate Pattern Mining Based on Probabilistic and Statistical Techniques | 957 |
116 Interactive SelfDiagnostic System Using Anatomical 3D Human Body | 966 |
117 RuleBased Naive Bayesian Filtering for Personalized Recommend Service | 977 |
118 Design of an Actigraphy Based Architecture for Mental Health Evaluation | 984 |
119 Efficient Detection of Content Polluters in Social Networks | 991 |
120 A Prototype Selection Algorithm Using Fuzzy kImportant Nearest Neighbor Method | 997 |
121 Enhanced Reinforcement Learning by Recursive Updating of Qvalues for Reward Propagation | 1003 |
122 Improved Method for Action Modeling Using Bayesian Probability Theory | 1009 |
Korean National Health and Nutrition Examinations Survey V1 | 1014 |
124 Data MiningDriven Chronic Heart Disease for Clinical Decision Support System Architecture in Korea | 1021 |
125 A Study on the Occurrence of Crimes Due to Climate Changes Using Decision Tree | 1027 |
126 A Case Study for the Application of Storage Tiering Based on ILM through Data Value Analysis | 1037 |
127 A Neural Network Mixture Model for Green Warranty Diffusion | 1054 |
Part IX Web Technology and Software Engineering | 1064 |
128 Generation of User Interest Ontology Using ID3 Algorithm in the Social Web | 1065 |
129 Collective Intelligence Based Algorithm for Ranking Book Reviews | 1075 |
130 Ranking Techniques for Finding Correlated Webpages | 1085 |
131 SquareWave Like Performance Change Detection Using SPC Charts and ANFIS | 1096 |
132 Hybrid Standard Platform for EJournal Usage Statistics Management | 1105 |
133 Study for Predict of the Future Software Failure Time Using Nonlinear Regression | 1117 |
134 Analysis of ThreatFactors for BiometricInformation Processing Systems According to GoalOriented Threat Modeling | 1125 |
135 Distinct Element Method Analysis of Retaining Wall Using Steel Frame and Fill Material | 1132 |
136 FullScaled Experiment for Behavior Investigation of Reinforced Concrete Columns with HighStrength Wire Ropes as Lateral Spiral Reinforcement | 1139 |
137 Local Deformed Diameter Analysis of a Pipe in Rigid Encasement for Watercrossings Application | 1147 |
138 A Study on Management System Design of Swimming Exercise Prescription by Using Fussy ANP | 1156 |
139 Intelligent Recommendation System for Automotive Parts Assembly | 1165 |
140 Model Transformation Verification Using Mapping Pattern and Model Transformation Similarity | 1171 |
141 Hierarchical Analysis of Steel House Material for 3D | 1179 |
142 MultiFaces Recognition Process | 1185 |
143 Software Performance Test Automation by Using the Virtualization | 1191 |
144 Requirement Analysis for AspectOriented System Development | 1201 |
145 System Analysis and Modeling Using SysML | 1210 |
Part X Green Convergence Services | 1221 |
146 Handover Latency Reduction Scheme for Railroad Communications in 4G Mobile Networks | 1223 |
REDOX Flow Battery | 1230 |
148 An Effective Interfacing Adapter for PRAM Based Main Memory via Flexible Management DRAM Buffer | 1237 |
IT Convergence and Security 2012 | 1243 |