{"title":"Road Management System of National Highway ITS","authors":"Sunghan Lim","doi":"10.1109/ICCIT.2009.301","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.301","url":null,"abstract":"National highway ITS has been shifted to \"Integrated Road Transportation Management, which incorporates road safety and management technologies, from traditional \"Transportation Management\". This paper describes the road management system which is suitable to national highway ITS. When efficient integrated road transportation management system (transportation + road management) is developed by introducing road management system to national highway ITS, reduction in traffic congestion cost, travel time and traffic accident and improvement of road management are expected thanks to integration of road safety and management technology. And based on automobiles and mobile phones distributed in Korea, the creation of new market in telematics and ubiquitous area is highly expected.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme with Short Ciphertext","authors":"Wenbo Shi, Injoo Jang, H. Yoo","doi":"10.1109/ICCIT.2009.157","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.157","url":null,"abstract":"In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al’s scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption algorithm, the number of MaptoPoint hash function and the length of ciphertext from O(n) to O(1). Furthermore, we proved the proposed scheme satisfy the security requirement under indistinguishability of encryptions under fuzzy selective-ID, chosen ciphertext attack (IND-FSIDCCA).","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130109344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Model Framework for Supply of Active Situation Decision Service","authors":"Su-kyoung Kim, Ho‐Jin Choi","doi":"10.1109/ICCIT.2009.262","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.262","url":null,"abstract":"This study provides the decision of situation service ontology model framework for providing the knowledge service in which it relates to the dynamic situation in the next generation network environment and it most determines an appropriate according to the various situations and presents that the knowledge base of the ontology base is useful. Presented at a preexistence is focused on the method for modeling the single space ontology or the static ontology. However, as to these there is a difficulty in the expression of the active information according to the current situation of the network environment changed on a real time basis or under the present conditions of a user. Therefore, the case in which the inferential decision-making through the according to this is not exact occurs. Therefore, this study, proposed the knowledge representation pattern which could actively manage with the network environment and the user situation in which it changes based on the various service according to the situation where it can be generated around a role and reuse of the knowledge domain from the similar MVC pattern ontology framework and user and in which it can reason and the ontology model of the service center showed that the decision making according to the change of the time and space or the situation was suitable.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"2672 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Rural Spatial Distribution in China Based on Urban-Rural Integrated Planning Management","authors":"Tao-fang Yu, Jing-xiang Zhang, Li-jing Sun, Wen-yun Huang","doi":"10.1109/ICCIT.2009.72","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.72","url":null,"abstract":"Along with the rapid development of urbanization and industrialization in China, the vast rural areas in China, especially in developed regions, is confronted with new development bottleneck and confusion. Under such circumstance, universal attention has been paid to urban-rural integrated planning as an effective way to promote positive interaction between urban and rural areas as well as a new perspective to study rural spatial distribution in a new area in China. By analyzing the concept and connotation of urban-rural integrated planning in combination with the case study of Jiangning subdistrict in Nanjing, this paper carries out some useful exploration in current problems and contradictions in rural spatial development, methods and principles for distribution planning as well as innovation of relative supporting policies and systems in China.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123336956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploitation on the Knowledge Transfer of the Time-Cost Optimization","authors":"Lijun Wan, Yang Wang","doi":"10.1109/ICCIT.2009.221","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.221","url":null,"abstract":"The converting of tacit knowledge is the key of enterprise knowledge management. It facilitates the knowledge transferring between the contractor and subcontractors. Based on the difficulties in the process of knowledge transfer, this paper has focused on the manifesting the implicit knowledge by using the comparisons method. This paper emphatically introduces a series of institutional innovations including adjusting for optimized expenses curve, redrawing the net diagram and redefine total costs. It is also shown that the interests’ mechanism is the solid foundation in the process of manifesting. In addition, other countermeasure and safeguard measure were provided.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Techniques for Feature Reduction in Intrusion Detection Systems: A Comparison","authors":"M. Bahrololum, E. Salahi, M. Khaleghi","doi":"10.1109/ICCIT.2009.89","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.89","url":null,"abstract":"in recent years, intrusion detection has emerged as an important technique for network security. Machine learning techniques have been applied to the field of intrusion detection. They can learn normal and anomalous patterns from training data and via Feature selection improving classification by searching for the subset of features which best classifies the training data to detect attacks on computer system. The quality of features directly affects the performance of classification. Many feature selection methods introduced to remove redundant and irrelevant features, because raw features may reduce accuracy or robustness of classification. In this paper we compared three methods for feature selection based on Decision trees (DT), Flexible Neural Tree (FNT) and Particle Swarm Optimization (PSO). The results based on comparison of three methods on DARPA KDD99 benchmark dataset indicate that DT has almost better accuracy.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mukesh Tiwari, K. V. Arya, R. Choudhari, K. Choudhary
{"title":"Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information","authors":"Mukesh Tiwari, K. V. Arya, R. Choudhari, K. Choudhary","doi":"10.1109/ICCIT.2009.290","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.290","url":null,"abstract":"The wireless sensor networks (WSNs) are being deployed frequently in variety of environments such as military surveillance, forest fire monitoring, chemical leakage monitoring etc. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network .Performance evaluation of wireless sensor network requires realistic modeling of Intrusion detection system since most of WSNs are application specific. In WSN, nodes have specific properties such as stable neighbors’ information that helps in detection of anomalies in network. Nodes monitor their neighborhood and collaborate with cluster head to detect malicious behavior. Even though nodes don’t have global view but they can still detect an intrusion with certain probability and report to cluster head. This paper introduces a specification based Intrusion Detection System for wireless sensor networks.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Choudhari, K. V. Arya, Mukesh Tiwari, K. Choudhary
{"title":"Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism","authors":"R. Choudhari, K. V. Arya, Mukesh Tiwari, K. Choudhary","doi":"10.1109/ICCIT.2009.277","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.277","url":null,"abstract":"The Stream Control Transmission Protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP mechanism that uses an additional new SCTP chunk with cryptographic hash operation to check the integrity of the client that helps in easy detection/prevention of some traditional attacks in the SCTP. Using this, the Cookie mechanism can be minimized to clear-text.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMARTMUSEUM: Cultural Content Recommendation System for Mobile Users","authors":"A. Kuusik, Sylvain Roche, F. Weis","doi":"10.1109/ICCIT.2009.257","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.257","url":null,"abstract":"The work describes SMARTMUSEUM ICT solution of personalized cultural heritage content access for mobile users. Addressed aspects include unifying user preferences, context information and respective annotation of content. Implemented real solution is described briefly.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Management and Optimization Modeling (for Decision Making)","authors":"Broderick Crawford, Carlos Castro, É. Monfroy","doi":"10.1109/ICCIT.2009.85","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.85","url":null,"abstract":"This paper is motivated by the need to address the innovative development of algorithms to solve combinatorial problems, generally issued from decision making. Because modeling and resolution of this kind of problems is a software engineering subject, then to find better ways of developing algorithms, solvers and metaheuristics is our interest too. Here, we fixed some concepts from knowledge management, creativity and new software engineering trends applied in our work.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}