5th International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
Online banking authentication system using mobile-OTP with QR-code 网上银行认证系统使用移动otp与qr码
Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee
{"title":"Online banking authentication system using mobile-OTP with QR-code","authors":"Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711134","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711134","url":null,"abstract":"As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Research on 29 DMUs rural infrastructure investment efficiency using Malmquist-DEA method 基于Malmquist-DEA方法的29个城市农村基础设施投资效率研究
Xu Shuhong
{"title":"Research on 29 DMUs rural infrastructure investment efficiency using Malmquist-DEA method","authors":"Xu Shuhong","doi":"10.1109/ICCIT.2010.5711162","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711162","url":null,"abstract":"Analyzing investment efficiency of rural infrastructure is an important way to further exploit investment capacity and optimize resources distribution. On the basis of expounding basic principles of Malmquist-DEA, it chooses panel data in 1990–2007, and then measures and analysis the 29 DMUs' changes of TE, TP, PTE and SE, in order to improve investment efficiency of rural infrastructure in the east-central-west regions and further resolve the “Agriculture, Countryside and Farmer” issues.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis towards a KVM-Based embedded real-time virtualization architecture 基于kvm的嵌入式实时虚拟化架构的性能分析
Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan
{"title":"Performance analysis towards a KVM-Based embedded real-time virtualization architecture","authors":"Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan","doi":"10.1109/ICCIT.2010.5711095","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711095","url":null,"abstract":"In Recent years embedded world has been undergoing a shift from traditional single-core processors to processors with multiple cores. However, this shift poses a challenge of adapting legacy uniprocessor-oriented real-time operating system (RTOS) to exploit the capability of multi-core processor. In addition, some embedded systems are inevitably going towards the direction of integrating real-time with off-the-shelf time-sharing system, as the combination of the two has the potential to provide not only timely and deterministic response but also a large application base. Virtualization technology, which ensures strong isolation between virtual machines, is therefore a promising solution to above mentioned issues. However, there remains a concern regarding the responsiveness of the RTOS running on top of a virtual machine. In this paper we propose an embedded real-time virtualization architecture based on Kernel-Based Virtual Machine (KVM), in which VxWorks and Linux are combined together. We then analyze and evaluate how KVM influences the interrupt-response times of VxWorks as a guest operating system. By applying several real-time performance tuning methods on the host Linux, we will show that sub-millisecond interrupt response latency can be achieved on the guest VxWorks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Energy environmental education that supports sustainable town development 支持城镇可持续发展的能源环境教育
K. Takemata, A. Minamide, A. Minamide, Y. Kawata
{"title":"Energy environmental education that supports sustainable town development","authors":"K. Takemata, A. Minamide, A. Minamide, Y. Kawata","doi":"10.4156/ijact.vol3.issue3.2","DOIUrl":"https://doi.org/10.4156/ijact.vol3.issue3.2","url":null,"abstract":"This study is related to the development of teaching materials for energy environmental education. It is focused on the thermal environment issues of the earth. In order to understand the thermal environment of the earth, it is necessary to learn regional thermal environments in local area first. We have developed an educational program for grasping the current situation of land coverage in each region while considering a community bus, which is one of public transportation means. In addition, we have produced teaching contents for stirring students' interests in the thermal environment, based on the air temperature observation data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On a Digital-Right-Management system using One-Time-Password 基于一次性密码的数字版权管理系统研究
Beum-Su Park, Shirley Lee, Hoon-Jae Lee
{"title":"On a Digital-Right-Management system using One-Time-Password","authors":"Beum-Su Park, Shirley Lee, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711214","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711214","url":null,"abstract":"Recently, due to the development of internet and digital media technology, the usage of illegal copy and distribution of digital media contents is increasing as well. Digital Right Management (DRM) was introduced to control the usage of the illegal and distribution of digital media. However, there are still some limitations in current DRM system. In this paper, we analyze the problem of existing DRM system by using One-Time Password (OTP) based on PINGPONG 128. In addition, we used partial descryption during the streaming progress to increase the security of the scheme.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visual data hiding in dot diffusion images 隐藏在点扩散图像中的可视数据
Xiaotian Wu, Wei Sun
{"title":"Visual data hiding in dot diffusion images","authors":"Xiaotian Wu, Wei Sun","doi":"10.1109/ICCIT.2010.5711123","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711123","url":null,"abstract":"In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Change Detection by Level (CDL): An efficient algorithm to detect change on XML documents 按级别更改检测(CDL):一种检测XML文档更改的有效算法
Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia
{"title":"Change Detection by Level (CDL): An efficient algorithm to detect change on XML documents","authors":"Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia","doi":"10.1109/ICCIT.2010.5711019","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711019","url":null,"abstract":"Nowadays XML have reached a great interest, because it is possible to share information through the Web. Moreover, the Web can be conceived as a huge Database. Therefore, like DBMS traditional, the Web needs efficient algorithms to detect changes on the Database. In this paper we present an efficient algorithm to detect change in XML documents. Algorithm efficiency resides in the efficient application of Hash function and how this information is used. The theoretical complexity of algorithm is O(nlogn+ eG), where n is the number of vertices and eG is the cost to check all edges. The proposed algorithm was compared with X-Diff algorithm in order to show the new algorithm performance. Experimental results show a much better performance of CDL algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Realistic woven fabric rendering using deformed microfacet distribution function 利用变形微面分布函数绘制真实感机织织物
Sung-Soo Kim, Young-Min Kang, Jongho Won
{"title":"Realistic woven fabric rendering using deformed microfacet distribution function","authors":"Sung-Soo Kim, Young-Min Kang, Jongho Won","doi":"10.1109/ICCIT.2010.5711186","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711186","url":null,"abstract":"We present a new procedural method for photorealistic rendering of woven fabric material. The goal of our research is to provide a new procedural method that renders photorealistic woven fabric without any measured data. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and yarn-level surface normal manipulation. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and deformed microfacet distribution function (MDF). The deformed MDF effectively represents the perturbed reflectance caused by bumps on the woven fabric surface. The experimental results show the proposed method can be successfully applied to photorealistic rendering of diverse woven fabric materials.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault attack for the iterative operation of AES S-Box AES S-Box迭代操作的故障攻击
JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha
{"title":"Fault attack for the iterative operation of AES S-Box","authors":"JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha","doi":"10.1109/ICCIT.2010.5711116","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711116","url":null,"abstract":"This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The empirical study on fractal characteristics of real estate market 房地产市场分形特征的实证研究
Yao Feng-ge, Han Jing
{"title":"The empirical study on fractal characteristics of real estate market","authors":"Yao Feng-ge, Han Jing","doi":"10.1109/ICCIT.2010.5711159","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711159","url":null,"abstract":"The traditional real estate market theories are studied within the frame of neoclassical economics. As the core of neoclassical economics, Efficient Market Hypothesis (EMH) is the foundation of real estate market theory. But the traditional linear paradigm is facing a serious challenge from non-linear paradigm. Using R/S analysis method, which is the classical algorithm of Hurst index based on fractal characteristics, this paper did simulated experiment in the real estate market of china. The result shows that there exists a complex interaction among the factors, which could affect real estate market in China. It also reveals that Efficient Market Hypothesis (EMH) is not quite in line with the realities of the real estate market, and the psychology of individual and group investors has significant influence on the real estate market. The characters of fluctuations of real estate revenue in China are non-linear, non-equilibrium, fractal and chaotic. The fluctuation is in line with Fractional Brownian motion.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信