2011 International Conference on Ubiquitous Computing and Multimedia Applications最新文献

筛选
英文 中文
Semantic Process Management Environment 语义过程管理环境
S. Choi
{"title":"Semantic Process Management Environment","authors":"S. Choi","doi":"10.1109/UCMA.2011.31","DOIUrl":"https://doi.org/10.1109/UCMA.2011.31","url":null,"abstract":"As the knowledge-based society has been constructed, the size of work process grows bigger and the amount of the information that has to be analyzed increases. So the necessity of the process management and improvement has been required highly. This study suggests the process management method to support a company's survival strategy to get the competitive power in difficult situation to predict future business environment. The suggested process management method applies ontology for formalizing and sharing the several generalized process management concept. In ontology, several techniques from Six Sigma and PSP are defined for process definition, execution and measurement. With ontology, we provide formal knowledge base for both process management environment and human stakeholders. Also, we can easily improve our environment by extending our process ontology to adapt new management methods.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122430889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Micro Reality Mining of a Cell Phone Usage Behavior: A General Bayesian Network Approach 手机使用行为的微观现实挖掘:一种通用贝叶斯网络方法
S. Chae, Min Hee Hahn, K. Lee
{"title":"Micro Reality Mining of a Cell Phone Usage Behavior: A General Bayesian Network Approach","authors":"S. Chae, Min Hee Hahn, K. Lee","doi":"10.1109/UCMA.2011.34","DOIUrl":"https://doi.org/10.1109/UCMA.2011.34","url":null,"abstract":"Successful products and services result from a keen awareness of the micro motives and factors underlying consumer behavior in the real world. Similarly, the success of ubiquitous decision support systems is heavily dependent on the capability of micro-reality mining from consumer behavior data. Micro-reality mining is defined by the system's ability to extract a set of trivial but meaningful rules of action from consumer behavior data. This study is based on the hard fact that such trivialness leads to the macro behavior of consumers. As an example of successful micro-reality mining, this paper proposes a new method based on General Bayesian Network (GBN). Using MIT students' real life data, we applied GBN and obtained a set of causal relationships among a set of relevant variables. The what-if and goal-seeking simulations with the causal relationships supported by GBN allowed us to explore the usefulness of GBN-driven micro-reality data mining.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116906840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Encryption Schemes as Used in Communication between SCADA Components SCADA组件间通信加密方案比较
R. J. Robles, Maricel O. Balitanas, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim
{"title":"Comparison of Encryption Schemes as Used in Communication between SCADA Components","authors":"R. J. Robles, Maricel O. Balitanas, Ronnie D. Caytiles, Yvette E. Gelogo, Tai-hoon Kim","doi":"10.1109/UCMA.2011.33","DOIUrl":"https://doi.org/10.1109/UCMA.2011.33","url":null,"abstract":"In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes can be integrated to SCADA communication. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, comparison between Encryption Schemes as used in Communication between SCADA Components is discussed.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance Optimization of MTP Stack MTP栈的性能优化
G. Prakash, B. Sujatha
{"title":"Performance Optimization of MTP Stack","authors":"G. Prakash, B. Sujatha","doi":"10.1109/UCMA.2011.32","DOIUrl":"https://doi.org/10.1109/UCMA.2011.32","url":null,"abstract":"The paper deals with the steps proposed for performance optimization of PC to device file transfer. From the Key Performance Index (KPI) testing its seen that PC to device file transfer takes more time than Device to PC whose performance is good at the MTP (Media Transfer Protocol) level. Hence necessary steps are taken to increase the performance of PC to Device transfer, for ex: for a file transfer sized 626 MB used to take 143.319 seconds and after necessary optimization the time taken for the same 626MB file transfer is 113 seconds i.e. the throughput of nearly 1.163 MB increase is achieved. Secondly Enhanced enumeration is supported where the parent and child handles are called only when required.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Privacy Scheme for Providing Anonymity Technique on Sensor Network 一种新的传感器网络匿名保密方案
2011 International Conference on Ubiquitous Computing and Multimedia Applications Pub Date : 2011-04-13 DOI: 10.6029/smartcr.2011.01.004
Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Moon-seog Jun
{"title":"A New Privacy Scheme for Providing Anonymity Technique on Sensor Network","authors":"Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Moon-seog Jun","doi":"10.6029/smartcr.2011.01.004","DOIUrl":"https://doi.org/10.6029/smartcr.2011.01.004","url":null,"abstract":"Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Realization for Security System of Facility Management Based USN 基于USN的设施管理安全系统的设计与实现
Joo-Kwan Lee, Jeong-Jae Kim, Moon-seog Jun
{"title":"Design and Realization for Security System of Facility Management Based USN","authors":"Joo-Kwan Lee, Jeong-Jae Kim, Moon-seog Jun","doi":"10.1109/UCMA.2011.15","DOIUrl":"https://doi.org/10.1109/UCMA.2011.15","url":null,"abstract":"Regardless of the technical significance held by USN, the un-manned surveillance using wireless network cameras, the sensing technologies using the trespassing surveillance sensors as well as the technologies of encoding the data occurring within such systems, the technologies of transferring and processing them through the sensor network and the efficient person positioning and placement method using RFID have become a single integrated system in the industrial field for the security of facilities and have not yet been provided as services. The present paper proposes the user tracking and management systems using RFID, sensor and microwave intrusion detecting to replace the composition of network cameras and the existing infrared intrusion detecting sensors.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bioworks: A Workflow System for Automation of Bioinformatics Analysis Processes 生物工程:生物信息学分析过程自动化的工作流程系统
Youngmahn Han
{"title":"Bioworks: A Workflow System for Automation of Bioinformatics Analysis Processes","authors":"Youngmahn Han","doi":"10.1109/UCMA.2011.25","DOIUrl":"https://doi.org/10.1109/UCMA.2011.25","url":null,"abstract":"Over the past decade, the rapid development of high-throughput technologies has lead to an explosive growth in biological information. Many molecular biology fields involve in-silico experiments using bioinformatics applications. A workflow can be well-defined model for bioinformatics analysis processes to be performed as a chain of interlinked data process tasks. We have developed a client/server-based workflow system called Bioworks, supporting large-scale analysis through the high performance cluster computing resources. In this paper, we highlight implementation methods in Bioworks, for meeting key requirements of effective workflow systems for bioinformatics analysis processes.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Mobile Information Centre for Location Prediction and Effective Handoff 用于位置预测和有效切换的移动信息中心
K. Bose, V. Sankaranarayanan
{"title":"Mobile Information Centre for Location Prediction and Effective Handoff","authors":"K. Bose, V. Sankaranarayanan","doi":"10.1109/UCMA.2011.20","DOIUrl":"https://doi.org/10.1109/UCMA.2011.20","url":null,"abstract":"Processing handoff is a significant issue in wireless communication system. When a mobile node (MN) moves from its current Access Point (AP) to another, a new connection with a new Access Point has to be established and the old connection has to be released. The handoff decision is done by Access Point, by measuring the signal Quality. In this paper, selection of a new Access Point and the prediction of the location of Mobile Node based on distance is presented.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach to Detect Accurate Breast Boundary in Digital Mammogram Using Binary Homogeinity Enhancement Algorithm 一种利用二值均匀性增强算法检测数字乳房图像精确乳房边界的新方法
I. Maitra, Sanjay Nag, S. Bandyopadhyay, Tai-hoon Kim
{"title":"A Novel Approach to Detect Accurate Breast Boundary in Digital Mammogram Using Binary Homogeinity Enhancement Algorithm","authors":"I. Maitra, Sanjay Nag, S. Bandyopadhyay, Tai-hoon Kim","doi":"10.1109/UCMA.2011.24","DOIUrl":"https://doi.org/10.1109/UCMA.2011.24","url":null,"abstract":"Computer Aided Diagnosis (CAD) systems have improved diagnosis of abnormalities in mammogram images. The principal feature within the breast region is the breast contour. Extraction of the breast region and delineation of the breast contour allows the search for abnormalities to be limited to the region of the breast without undue influence from the background of the mammogram. After performing an essential pre-processing step to suppress artifacts and accentuate the breast region, the exact breast region as the region of interest (ROI), has to be segmented. In this paper we present a fully automated segmentation and boundary detection method for mammographic images. In this research paper we have proposed a new homogeneity enhancement process namely Binary Homogeneity Enhancement Algorithm (BHEA) for digital mammogram. This is followed by a novel approach for edge detection (EDA) and finally obtaining the breast boundary by using our proposed Breast Border Boundary Enhancement Algorithm. This composite method have been implemented and applied to mini-MIAS, one of the most well-known mammographic databases consisting of 322 mediolateral oblique (MLO) view obtained via a digitization procedure. To demonstrate the capability of our segmentation algorithm it was extensively tested on mammograms using ground truth images and quantitative metrics to evaluate its performance characteristics. The experimental results indicate that the breast boundary regions were extracted accurately characterize the corresponding ground truth images. The algorithm is fully autonomous, and is able to preserve skin and nipple (if in profile), a task very few existing mammogram segmentation algorithms can claim.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121889495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Method for Signature Authentication Scheme 一种签名认证方案的方法
S. Bandyopadhyay
{"title":"A Method for Signature Authentication Scheme","authors":"S. Bandyopadhyay","doi":"10.1109/UCMA.2011.18","DOIUrl":"https://doi.org/10.1109/UCMA.2011.18","url":null,"abstract":"In this paper we propose a new Handwritten Signature Authentication Scheme. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信