2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set 攻击弱连通支配集危及Ad-Hoc网络
Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou
{"title":"Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set","authors":"Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou","doi":"10.1109/IMIS.2015.33","DOIUrl":"https://doi.org/10.1109/IMIS.2015.33","url":null,"abstract":"As a special kind of attack, the node compromise attack destroy security, reliability and confidentiality of ad-hoc networks. However, previous research paid little attention on developing general attacking models, which are fundamentals for designing network security mechanisms. In this paper, we approach node compromise attack formalizing problem from an adversarial view and present a general attacking model based on invading virtual backbones of network, which is constructed based on Weakly Connected Dominating Set (WCDS). To investigate the features of our scheme, simulations are conducted to illustrate the influences of infection ratio to network performance. Analysis and simulations results showed that bigger infection ratio can reduce set of compromised nodes, enhance attacking efficiency, save resource expenditure and shorten attacking time.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Impact of Use of Information Technology Teaching for Kindergarten Education 信息技术教学对幼儿园教育的影响
Yen-Tsung Lin, Hsing-Chung Chun, S. Chuang
{"title":"The Impact of Use of Information Technology Teaching for Kindergarten Education","authors":"Yen-Tsung Lin, Hsing-Chung Chun, S. Chuang","doi":"10.1109/IMIS.2015.92","DOIUrl":"https://doi.org/10.1109/IMIS.2015.92","url":null,"abstract":"In this paper, the application of Information Technology (IT) was designed to improve the methods in the implementation process encountered difficulties and reactions for kindergarten teachers teaching their courses. Exploration results from three problems provide the practitioners and researchers as below. First, how kindergarten teachers apply IT into the teaching model? Second, how to solve problems encountered on when the IT applied into teaching? Third, how deal with some abnormal reactions from the children on when IT is applied into teaching? Case study method is adopted in this paper. A kindergarten from Nantou County, Taiwan, is chose as the research object named 'S kindergarten'. The data collection methods consist of observation, interviews and questionnaires. Since the main scope of the study focused on teaching activities, other information regarding as environmental issues will fail to investigate at the same time. Therefore, it could not be understood the whole features of IT applications adopted in kindergarten. In the future work, the relevant topics could be explored more deeply.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simplified 3D Hologram Heart Activity Monitoring Using a Smartphone 使用智能手机简化3D全息心脏活动监测
Tharoeun Thap, Yunyoung Nam, Heewon Chung, Jinseok Lee
{"title":"Simplified 3D Hologram Heart Activity Monitoring Using a Smartphone","authors":"Tharoeun Thap, Yunyoung Nam, Heewon Chung, Jinseok Lee","doi":"10.1109/IMIS.2015.87","DOIUrl":"https://doi.org/10.1109/IMIS.2015.87","url":null,"abstract":"In this paper, we use smartphone's built-in camera with flash light to obtain the pulsatile signal from fingertip and then apply the peak detection algorithm to detect the pulse's peaks and after that calculate the R-R interval (RRI) in real time. We design the animated heart images that beat according to each RRI of the pulsatile signal. At the same time, we make a simple pyramid hologram from a transparent film to show the beating heart above the smartphone screen in three-dimensional view. By doing this, people can actually see their heart is beating artificially rather than to see the pulsatile signal graphically.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set 基于统一缺陷模式集的源代码与二进制可执行文件协同分析技术研究
Xiaobing Liang, Baojiang Cui, Yin-Jun Lv, Yilun Fu
{"title":"Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set","authors":"Xiaobing Liang, Baojiang Cui, Yin-Jun Lv, Yilun Fu","doi":"10.1109/IMIS.2015.40","DOIUrl":"https://doi.org/10.1109/IMIS.2015.40","url":null,"abstract":"The security defect detection technology based on source code usually makes use of static analysis methods to detect security vulnerabilities in the test software, which does not consider the runtime information of program execution and the interaction information with the program runtime surrounding environment, so the security defect detection technology based on source code usually results in higher false positive rate. The binary program vulnerability detection methods based upon dynamic analysis usually have lower false positive rate, but their effectiveness depends entirely on test case generation, the detection efficiency of dynamic analysis based on binary program is lower. Moreover, the research of source code vulnerability detection technique and binary executable vulnerability detection technique are essentially fragmented, without considering the relationship between the two classes of methods. In order to improve the efficiency for source code and binary executables vulnerability detection, we presents a collaborative analysis method for vulnerability detection of source code and binary executables based upon the unified defect mode set, meanwhile, we verify the effectiveness of our method using a concrete example in this paper.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care 应用于医师临床护理的以患者为导向的移动医疗信息系统
Ching-Kan Lo, Ye-Chi Wu, Cheng-Hung Chuang, Hsing-Chung Chen
{"title":"A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care","authors":"Ching-Kan Lo, Ye-Chi Wu, Cheng-Hung Chuang, Hsing-Chung Chen","doi":"10.1109/IMIS.2015.89","DOIUrl":"https://doi.org/10.1109/IMIS.2015.89","url":null,"abstract":"The poor functionality, high cost, complexity of the electronic health record (EHR) and the poor integration of the traditional Hospital Information System (HIS) have been a challenging task for an efficient clinical workflow Methods and Participants. The study was conducted from the perspective on the hospital's staffs, which including doctors, nurses and clinical information technology (CIT) engineers, and patients' caregivers (usually the family member of the patient or the special caregiver hired by the patient) upon patients receiving joint replacement. Both quantitative and qualitative analyses were performed. Comparison of the functions, features and the overall satisfaction score of questionnaire on the proposed mobile medical information system (MMIS) and Traditional HIS/EHR showed that MMIS is more superior than traditional HIS/EHR. With the limited function of the traditional HIS/EHR, MMIS may be helpful for acquiring the second opinion from different specialists to the primary care providers in particular for time demanding or life threatening diseases. Further study within a larger sample size is needed to determine the extent of the benefits of the system on other type of surgical patients'.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Behavior-Based Analysis Techniques for HTML5 Malicious Features 基于行为的HTML5恶意特性分析技术
Hyun-lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim
{"title":"The Behavior-Based Analysis Techniques for HTML5 Malicious Features","authors":"Hyun-lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim","doi":"10.1109/IMIS.2015.67","DOIUrl":"https://doi.org/10.1109/IMIS.2015.67","url":null,"abstract":"HTML5 announced in October 2014 contains many more functions than previous HTML versions. It includes the media controls of audio, video, canvas, etc., and it is designed to access the browser file system through the Java Script API such as the web storage and file reader API. In addition, it provides the powerful functions to replace existing active X. As the HTML5 standard is adopted, the conversion of web services to HTML5 is being carried out all over the world. The browser developers particularly have high expectation for HTML5 as it provides many mobile functions. However, as there is much expectation of HTML5, the damage of malicious attacks using HTML5 is also expected to be large. The script, which is the key to HTML5 functions, is a different type from existing malware attacks as a malicious attack can be generated merely by only a user accessing a browser. The existing known attacks can also be reused by bypassing the detection systems through the new HTML5 elements. This paper intends to define the unique HTML5 behavior data through the browser execution data and to propose the detection of malware by categorizing the malicious HTML5 features.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Passive Storage Based Wireless Network Resource Management for 4G LTE 基于被动存储的4G LTE无线网络资源管理
Ran Tao, Wen’an Zhou, Xuhui Yang, Guanglin Han
{"title":"Passive Storage Based Wireless Network Resource Management for 4G LTE","authors":"Ran Tao, Wen’an Zhou, Xuhui Yang, Guanglin Han","doi":"10.1109/IMIS.2015.41","DOIUrl":"https://doi.org/10.1109/IMIS.2015.41","url":null,"abstract":"With the development of the wireless network technology and the smart mobile terminals, some new types of OTT services emerged. These OTT services have high data volume, requires many wireless radio resouces to transmit, which caused the network to be heavily loaded and unable to guarantee the QoE for other services. In order to meet the challenge, we proposed Passive Storage Based Wireless Network Resource Management architecture in the paper. This architecture makes use of the QoE properties of the new services types and balance the network load through time domain by storing the service data and transmit them to the UEs during the low load periods. As a result, the network load caused by the new OTT services is averaged though the time dimension and therefore relived the pressure the OTT services brought to the network. By our calculation and analysis, after implement the architecture, we could balance network load through time dimension as well as increase network capacity. What's more, with the development and the growth of new types of OTT services, the architecture could benefit the network even more.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security Threats Measurement Model for Reducing Cloud Computing Security Risk 降低云计算安全风险的安全威胁度量模型
Sen-Tarng Lai, Fang-Yie Leu
{"title":"A Security Threats Measurement Model for Reducing Cloud Computing Security Risk","authors":"Sen-Tarng Lai, Fang-Yie Leu","doi":"10.1109/IMIS.2015.64","DOIUrl":"https://doi.org/10.1109/IMIS.2015.64","url":null,"abstract":"Cloud computing is the trend of information resources sharing and also an important tool for enterprises or organizations to enhance competitiveness. Users have the flexibility to adjust request and configuration. However, network security and resource sharing issues have continued to threaten the operation of cloud computing, making cloud computing security encounter serious test. How to evaluate cloud computing security has become a topic worthy of further exploration. Combining system, management and technique three levels security factors, this paper proposes a Security Threats Measurement Model (STMM). Applying the STMM, security of cloud computing system environment can be effectively evaluated and cloud computing security defects and problems can be concretely identified. Based on the evaluation results, the user can choice the higher security service provider or request the service provider security improvement actions.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey of Hardware Features in Modern Browsers: 2015 Edition 现代浏览器硬件特性调查:2015版
Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa
{"title":"A Survey of Hardware Features in Modern Browsers: 2015 Edition","authors":"Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa","doi":"10.1109/IMIS.2015.72","DOIUrl":"https://doi.org/10.1109/IMIS.2015.72","url":null,"abstract":"Recently, Java Script with HTML5 has become popular for building Website. As a side effect, those technologies can be used to collect a so-called fingerprint that contains hardware information, such as battery status or screen size, of the browser device. A Web server can collect this information without the user's agreement. Our studies show that we can also collect information that could not be obtained with existing fingerprinting, e.g., The number of CPU cores, hard disk space, and so on. In this paper, we report the various kinds of information that can be collected by using Java Script with an HTML5 API.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Context-Aware Applications in Mobile Sink of Wireless Sensor Networks 无线传感器网络移动Sink中的上下文感知应用
Chia-Hsin Cheng, Yeong-Long Shiue, Wei-Chia Lo, Hsing-Chung Chen
{"title":"Context-Aware Applications in Mobile Sink of Wireless Sensor Networks","authors":"Chia-Hsin Cheng, Yeong-Long Shiue, Wei-Chia Lo, Hsing-Chung Chen","doi":"10.1109/IMIS.2015.58","DOIUrl":"https://doi.org/10.1109/IMIS.2015.58","url":null,"abstract":"The paper uses Zigbee wireless sensor networks to implement Context awareness through measuring the RSSI values for position. To decrease the situation of sensor failure, it is used low consumption in Zigbee wireless sensor networks. Since the transmission range of each sensor node is limited for low consumption, the transmission distance would be constrained severely. Thus, we propose that the mobile data collection device is used to collect each node's data and then aggregate data to the host side. We use RSSI indicator of each nodes to judge the relative position of this mobile sink to make context-aware services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信