{"title":"Semantic Process Management Environment","authors":"S. Choi","doi":"10.1109/UCMA.2011.31","DOIUrl":"https://doi.org/10.1109/UCMA.2011.31","url":null,"abstract":"As the knowledge-based society has been constructed, the size of work process grows bigger and the amount of the information that has to be analyzed increases. So the necessity of the process management and improvement has been required highly. This study suggests the process management method to support a company's survival strategy to get the competitive power in difficult situation to predict future business environment. The suggested process management method applies ontology for formalizing and sharing the several generalized process management concept. In ontology, several techniques from Six Sigma and PSP are defined for process definition, execution and measurement. With ontology, we provide formal knowledge base for both process management environment and human stakeholders. Also, we can easily improve our environment by extending our process ontology to adapt new management methods.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122430889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro Reality Mining of a Cell Phone Usage Behavior: A General Bayesian Network Approach","authors":"S. Chae, Min Hee Hahn, K. Lee","doi":"10.1109/UCMA.2011.34","DOIUrl":"https://doi.org/10.1109/UCMA.2011.34","url":null,"abstract":"Successful products and services result from a keen awareness of the micro motives and factors underlying consumer behavior in the real world. Similarly, the success of ubiquitous decision support systems is heavily dependent on the capability of micro-reality mining from consumer behavior data. Micro-reality mining is defined by the system's ability to extract a set of trivial but meaningful rules of action from consumer behavior data. This study is based on the hard fact that such trivialness leads to the macro behavior of consumers. As an example of successful micro-reality mining, this paper proposes a new method based on General Bayesian Network (GBN). Using MIT students' real life data, we applied GBN and obtained a set of causal relationships among a set of relevant variables. The what-if and goal-seeking simulations with the causal relationships supported by GBN allowed us to explore the usefulness of GBN-driven micro-reality data mining.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116906840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. J. Robles, Maricel O. Balitanas, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim
{"title":"Comparison of Encryption Schemes as Used in Communication between SCADA Components","authors":"R. J. Robles, Maricel O. Balitanas, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim","doi":"10.1109/UCMA.2011.33","DOIUrl":"https://doi.org/10.1109/UCMA.2011.33","url":null,"abstract":"In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is discussed.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Optimization of MTP Stack","authors":"G. Prakash, B. Sujatha","doi":"10.1109/UCMA.2011.32","DOIUrl":"https://doi.org/10.1109/UCMA.2011.32","url":null,"abstract":"The paper deals with the steps proposed for performance optimization of PC to device file transfer. From the Key Performance Index (KPI) testing its seen that PC to device file transfer takes more time than Device to PC whose performance is good at the MTP (Media Transfer Protocol) level. Hence necessary steps are taken to increase the performance of PC to Device transfer, for ex: for a file transfer sized 626 MB used to take 143.319 seconds and after necessary optimization the time taken for the same 626MB file transfer is 113 seconds i.e. the throughput of nearly 1.163 MB increase is achieved. Secondly Enhanced enumeration is supported where the parent and child handles are called only when required.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Moon-seog Jun
{"title":"A New Privacy Scheme for Providing Anonymity Technique on Sensor Network","authors":"Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Moon-seog Jun","doi":"10.6029/smartcr.2011.01.004","DOIUrl":"https://doi.org/10.6029/smartcr.2011.01.004","url":null,"abstract":"Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization for Security System of Facility Management Based USN","authors":"Joo-Kwan Lee, Jeong-Jae Kim, Moon-seog Jun","doi":"10.1109/UCMA.2011.15","DOIUrl":"https://doi.org/10.1109/UCMA.2011.15","url":null,"abstract":"Regardless of the technical significance held by USN, the un-manned surveillance using wireless network cameras, the sensing technologies using the trespassing surveillance sensors as well as the technologies of encoding the data occurring within such systems, the technologies of transferring and processing them through the sensor network and the efficient person positioning and placement method using RFID have become a single integrated system in the industrial field for the security of facilities and have not yet been provided as services. The present paper proposes the user tracking and management systems using RFID, sensor and microwave intrusion detecting to replace the composition of network cameras and the existing infrared intrusion detecting sensors.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bioworks: A Workflow System for Automation of Bioinformatics Analysis Processes","authors":"Youngmahn Han","doi":"10.1109/UCMA.2011.25","DOIUrl":"https://doi.org/10.1109/UCMA.2011.25","url":null,"abstract":"Over the past decade, the rapid development of high-throughput technologies has lead to an explosive growth in biological information. Many molecular biology fields involve in-silico experiments using bioinformatics applications. A workflow can be well-defined model for bioinformatics analysis processes to be performed as a chain of interlinked data process tasks. We have developed a client/server-based workflow system called Bioworks, supporting large-scale analysis through the high performance cluster computing resources. In this paper, we highlight implementation methods in Bioworks, for meeting key requirements of effective workflow systems for bioinformatics analysis processes.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Information Centre for Location Prediction and Effective Handoff","authors":"K. Bose, V. Sankaranarayanan","doi":"10.1109/UCMA.2011.20","DOIUrl":"https://doi.org/10.1109/UCMA.2011.20","url":null,"abstract":"Processing handoff is a significant issue in wireless communication system. When a mobile node (MN) moves from its current Access Point (AP) to another, a new connection with a new Access Point has to be established and the old connection has to be released. The handoff decision is done by Access Point, by measuring the signal Quality. In this paper, selection of a new Access Point and the prediction of the location of Mobile Node based on distance is presented.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Maitra, Sanjay Nag, S. Bandyopadhyay, Tai-hoon Kim
{"title":"A Novel Approach to Detect Accurate Breast Boundary in Digital Mammogram Using Binary Homogeinity Enhancement Algorithm","authors":"I. Maitra, Sanjay Nag, S. Bandyopadhyay, Tai-hoon Kim","doi":"10.1109/UCMA.2011.24","DOIUrl":"https://doi.org/10.1109/UCMA.2011.24","url":null,"abstract":"Computer Aided Diagnosis (CAD) systems have improved diagnosis of abnormalities in mammogram images. The principal feature within the breast region is the breast contour. Extraction of the breast region and delineation of the breast contour allows the search for abnormalities to be limited to the region of the breast without undue influence from the background of the mammogram. After performing an essential pre-processing step to suppress artifacts and accentuate the breast region, the exact breast region as the region of interest (ROI), has to be segmented. In this paper we present a fully automated segmentation and boundary detection method for mammographic images. In this research paper we have proposed a new homogeneity enhancement process namely Binary Homogeneity Enhancement Algorithm (BHEA) for digital mammogram. This is followed by a novel approach for edge detection (EDA) and finally obtaining the breast boundary by using our proposed Breast Border Boundary Enhancement Algorithm. This composite method have been implemented and applied to mini-MIAS, one of the most well-known mammographic databases consisting of 322 mediolateral oblique (MLO) view obtained via a digitization procedure. To demonstrate the capability of our segmentation algorithm it was extensively tested on mammograms using ground truth images and quantitative metrics to evaluate its performance characteristics. The experimental results indicate that the breast boundary regions were extracted accurately characterize the corresponding ground truth images. The algorithm is fully autonomous, and is able to preserve skin and nipple (if in profile), a task very few existing mammogram segmentation algorithms can claim.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121889495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Signature Authentication Scheme","authors":"S. Bandyopadhyay","doi":"10.1109/UCMA.2011.18","DOIUrl":"https://doi.org/10.1109/UCMA.2011.18","url":null,"abstract":"In this paper we propose a new Handwritten Signature Authentication Scheme. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}