2009 Fourth International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
Road Management System of National Highway ITS 国道ITS道路管理系统
Sunghan Lim
{"title":"Road Management System of National Highway ITS","authors":"Sunghan Lim","doi":"10.1109/ICCIT.2009.301","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.301","url":null,"abstract":"National highway ITS has been shifted to \"Integrated Road Transportation Management, which incorporates road safety and management technologies, from traditional \"Transportation Management\". This paper describes the road management system which is suitable to national highway ITS. When efficient integrated road transportation management system (transportation + road management) is developed by introducing road management system to national highway ITS, reduction in traffic congestion cost, travel time and traffic accident and improvement of road management are expected thanks to integration of road safety and management technology. And based on automobiles and mobile phones distributed in Korea, the creation of new market in telematics and ubiquitous area is highly expected.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme with Short Ciphertext 选择密文短密文安全模糊身份加密方案
Wenbo Shi, Injoo Jang, H. Yoo
{"title":"Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme with Short Ciphertext","authors":"Wenbo Shi, Injoo Jang, H. Yoo","doi":"10.1109/ICCIT.2009.157","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.157","url":null,"abstract":"In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al’s scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption algorithm, the number of MaptoPoint hash function and the length of ciphertext from O(n) to O(1). Furthermore, we proved the proposed scheme satisfy the security requirement under indistinguishability of encryptions under fuzzy selective-ID, chosen ciphertext attack (IND-FSIDCCA).","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130109344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ontology Model Framework for Supply of Active Situation Decision Service 主动态势决策服务提供的本体模型框架
Su-kyoung Kim, Ho‐Jin Choi
{"title":"An Ontology Model Framework for Supply of Active Situation Decision Service","authors":"Su-kyoung Kim, Ho‐Jin Choi","doi":"10.1109/ICCIT.2009.262","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.262","url":null,"abstract":"This study provides the decision of situation service ontology model framework for providing the knowledge service in which it relates to the dynamic situation in the next generation network environment and it most determines an appropriate according to the various situations and presents that the knowledge base of the ontology base is useful. Presented at a preexistence is focused on the method for modeling the single space ontology or the static ontology. However, as to these there is a difficulty in the expression of the active information according to the current situation of the network environment changed on a real time basis or under the present conditions of a user. Therefore, the case in which the inferential decision-making through the according to this is not exact occurs. Therefore, this study, proposed the knowledge representation pattern which could actively manage with the network environment and the user situation in which it changes based on the various service according to the situation where it can be generated around a role and reuse of the knowledge domain from the similar MVC pattern ontology framework and user and in which it can reason and the ontology model of the service center showed that the decision making according to the change of the time and space or the situation was suitable.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"2672 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Rural Spatial Distribution in China Based on Urban-Rural Integrated Planning Management 基于城乡统筹管理的中国农村空间布局研究
Tao-fang Yu, Jing-xiang Zhang, Li-jing Sun, Wen-yun Huang
{"title":"Research on Rural Spatial Distribution in China Based on Urban-Rural Integrated Planning Management","authors":"Tao-fang Yu, Jing-xiang Zhang, Li-jing Sun, Wen-yun Huang","doi":"10.1109/ICCIT.2009.72","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.72","url":null,"abstract":"Along with the rapid development of urbanization and industrialization in China, the vast rural areas in China, especially in developed regions, is confronted with new development bottleneck and confusion. Under such circumstance, universal attention has been paid to urban-rural integrated planning as an effective way to promote positive interaction between urban and rural areas as well as a new perspective to study rural spatial distribution in a new area in China. By analyzing the concept and connotation of urban-rural integrated planning in combination with the case study of Jiangning subdistrict in Nanjing, this paper carries out some useful exploration in current problems and contradictions in rural spatial development, methods and principles for distribution planning as well as innovation of relative supporting policies and systems in China.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123336956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploitation on the Knowledge Transfer of the Time-Cost Optimization 时间成本优化的知识转移研究
Lijun Wan, Yang Wang
{"title":"Exploitation on the Knowledge Transfer of the Time-Cost Optimization","authors":"Lijun Wan, Yang Wang","doi":"10.1109/ICCIT.2009.221","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.221","url":null,"abstract":"The converting of tacit knowledge is the key of enterprise knowledge management. It facilitates the knowledge transferring between the contractor and subcontractors. Based on the difficulties in the process of knowledge transfer, this paper has focused on the manifesting the implicit knowledge by using the comparisons method. This paper emphatically introduces a series of institutional innovations including adjusting for optimized expenses curve, redrawing the net diagram and redefine total costs. It is also shown that the interests’ mechanism is the solid foundation in the process of manifesting. In addition, other countermeasure and safeguard measure were provided.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Techniques for Feature Reduction in Intrusion Detection Systems: A Comparison 入侵检测系统中特征约简的机器学习技术:比较
M. Bahrololum, E. Salahi, M. Khaleghi
{"title":"Machine Learning Techniques for Feature Reduction in Intrusion Detection Systems: A Comparison","authors":"M. Bahrololum, E. Salahi, M. Khaleghi","doi":"10.1109/ICCIT.2009.89","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.89","url":null,"abstract":"in recent years, intrusion detection has emerged as an important technique for network security. Machine learning techniques have been applied to the field of intrusion detection. They can learn normal and anomalous patterns from training data and via Feature selection improving classification by searching for the subset of features which best classifies the training data to detect attacks on computer system. The quality of features directly affects the performance of classification. Many feature selection methods introduced to remove redundant and irrelevant features, because raw features may reduce accuracy or robustness of classification. In this paper we compared three methods for feature selection based on Decision trees (DT), Flexible Neural Tree (FNT) and Particle Swarm Optimization (PSO). The results based on comparison of three methods on DARPA KDD99 benchmark dataset indicate that DT has almost better accuracy.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information 基于局部信息的WSN黑洞和选择性转发攻击入侵检测设计
Mukesh Tiwari, K. V. Arya, R. Choudhari, K. Choudhary
{"title":"Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information","authors":"Mukesh Tiwari, K. V. Arya, R. Choudhari, K. Choudhary","doi":"10.1109/ICCIT.2009.290","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.290","url":null,"abstract":"The wireless sensor networks (WSNs) are being deployed frequently in variety of environments such as military surveillance, forest fire monitoring, chemical leakage monitoring etc. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network .Performance evaluation of wireless sensor network requires realistic modeling of Intrusion detection system since most of WSNs are application specific. In WSN, nodes have specific properties such as stable neighbors’ information that helps in detection of anomalies in network. Nodes monitor their neighborhood and collaborate with cluster head to detect malicious behavior. Even though nodes don’t have global view but they can still detect an intrusion with certain probability and report to cluster head. This paper introduces a specification based Intrusion Detection System for wireless sensor networks.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism SCTP- sec的性能评估:一种安全的SCTP机制
R. Choudhari, K. V. Arya, Mukesh Tiwari, K. Choudhary
{"title":"Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism","authors":"R. Choudhari, K. V. Arya, Mukesh Tiwari, K. Choudhary","doi":"10.1109/ICCIT.2009.277","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.277","url":null,"abstract":"The Stream Control Transmission Protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP mechanism that uses an additional new SCTP chunk with cryptographic hash operation to check the integrity of the client that helps in easy detection/prevention of some traditional attacks in the SCTP. Using this, the Cookie mechanism can be minimized to clear-text.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SMARTMUSEUM: Cultural Content Recommendation System for Mobile Users SMARTMUSEUM:移动用户文化内容推荐系统
A. Kuusik, Sylvain Roche, F. Weis
{"title":"SMARTMUSEUM: Cultural Content Recommendation System for Mobile Users","authors":"A. Kuusik, Sylvain Roche, F. Weis","doi":"10.1109/ICCIT.2009.257","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.257","url":null,"abstract":"The work describes SMARTMUSEUM ICT solution of personalized cultural heritage content access for mobile users. Addressed aspects include unifying user preferences, context information and respective annotation of content. Implemented real solution is described briefly.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Knowledge Management and Optimization Modeling (for Decision Making) 知识管理与优化建模(面向决策)
Broderick Crawford, Carlos Castro, É. Monfroy
{"title":"Knowledge Management and Optimization Modeling (for Decision Making)","authors":"Broderick Crawford, Carlos Castro, É. Monfroy","doi":"10.1109/ICCIT.2009.85","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.85","url":null,"abstract":"This paper is motivated by the need to address the innovative development of algorithms to solve combinatorial problems, generally issued from decision making. Because modeling and resolution of this kind of problems is a software engineering subject, then to find better ways of developing algorithms, solvers and metaheuristics is our interest too. Here, we fixed some concepts from knowledge management, creativity and new software engineering trends applied in our work.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信