{"title":"A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous","authors":"Sooyoung Kang, Imyeong Lee","doi":"10.1109/MUE.2008.38","DOIUrl":"https://doi.org/10.1109/MUE.2008.38","url":null,"abstract":"The RFID system, a core technology used in building a ubiquitous environment utilizing radio frequency identification, is an alternative to bar-codes. The RFID system has become very popular, with various strengths such as recognition speed and non-touch method. However, there are some problems remaining as the low- cost tag can be operated through query, which leads to information exposure and privacy encroachment. Various approaches have been used to increase security of the system, but the low-cost tag, which has about 5 K-10 K gate capabilities, can only allocate 250-3 K gate to security. Therefore, the current study will provide a reciprocal authentication solution that can be used with low-cost RFID systems, by separating 64 bit keys and minimizing calculations. Existing systems divided a 96 bit key into 4 parts. However, the proposed system reduces the key to 32 bits, and reduces the communications down to 5 from 7. Also, one additional random number is added to the existing two numbers to increase security. To improve the previous system, which only provided XOR calculations, an additional hash function was added. The added procedure does not increase effectiveness, compared to the XOR calculation, but does provide more security to the RFID system, which can be used in remote distances.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126872008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Technique for Real-Time Internet Radio Recorder on Non-DSP Embedded System","authors":"L. Hwang, Chien-Chou Shih, I-Ting Kuo","doi":"10.1109/MUE.2008.36","DOIUrl":"https://doi.org/10.1109/MUE.2008.36","url":null,"abstract":"The capability of providing real-time multimedia player over the Internet is an important future application for embedded system. However, the main challenge of such an application is the limitation on computation performance and memory size in architecture of embedded system, especially while encoding and decoding. In this paper, a streaming packet tracer (SPT) algorithm is proposed for realtime tracing the streaming packet header. Based on the SPT algorithm, we present a novel software-based technique which enables a non-DSP embedded system to play and record real-time streaming audio simultaneously. To verify the feasibility of the proposed technique, a real-time Internet radio recorder has been implemented on SBC-2410x embedded system successfully. The experimental results show that our achievement has reduced the CPU usage rate from over 100% to about 30%-40% in comparison with other recording method.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-Ju Lee, C. Park, Jin-Whan Jeong, Hag-Young Kim
{"title":"UMOST : Ubiquitous Multimedia Framework for Context-Aware Session Mobility","authors":"Yong-Ju Lee, C. Park, Jin-Whan Jeong, Hag-Young Kim","doi":"10.1109/MUE.2008.120","DOIUrl":"https://doi.org/10.1109/MUE.2008.120","url":null,"abstract":"With the increasing use of small portable devices and wireless networks, a trend to support computing on the move has emerged. This trend is referred to as 'anytime/anywhere computing' for mobility support. In particular, multimedia service with heterogeneous devices, location-free access and user-context awareness is still a very active and evolving field of research in broad areas. In this paper, a movable multimedia framework, namely UMOST(ubiquitous middleware of streaming technology), is proposed for multimedia session mobility. It provides various levels of quality of service management, as well as seamless user-level handoffs using MPEG-21 digital item adaptation (DIA). It serves scalable streaming adaptive to the user, and deploys a back-end content distribution network for adapting dynamically to environmental changes through prefetching. The implemented framework employs a smart space aimed at demonstrating the feasibility of multimedia session mobility..","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing","authors":"Do-Hoon Kim, M. Lee, Longzhe Han, H. In","doi":"10.1109/MUE.2008.100","DOIUrl":"https://doi.org/10.1109/MUE.2008.100","url":null,"abstract":"In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB using HOMC focuses on the first step to improve the performance of Ubiquitous broadcast computing. The proposed model is characterized by its ability to optimize the receiving query and sending report for broadcasting with probabilistic priority by Markov assumption. Moreover, our model enhanced the reliability of broadcasting by weight value. In this paper we also set up a mobile p2p ad-hoc networks by Qualnet simulator which created the value of the specific configuration of mobile units and estimated the performance our model with other algorithm or ideal case.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Language Watermarking for Korean Using Adverbial Displacement","authors":"Mi-Young Kim","doi":"10.1109/MUE.2008.79","DOIUrl":"https://doi.org/10.1109/MUE.2008.79","url":null,"abstract":"This paper explores the method for Korean text watermarking and develops a syntactic tree-based adverbial displacement scheme. Korean, as an agglutinative language, provides a good ground for the syntactic tree-based natural language watermarking because syntactic constituent order is relatively free -especially syntactic adverbial. Our proposed natural language watermarking method consists of six procedures. First, we construct a syntactic dependency tree of unmarked text. Next, we perform clausal segmentation from the syntactic tree. Third, we choose a target adverbial constituent, which will be displaced within its clause. Then, we embed a watermark bit. Fifth, if the watermark bit does not coincide with the direction of the target adverbial displacement, we displace the target adverbial constituent in the syntactic tree. Finally, from the modified syntactic tree, we obtain a marked text. From the experimental results, we show that the coverage of our method outperforms that of previous systems, and the rate of unnatural sentences of marked text is better than that of previous systems. Experimental results also show that the marked text keeps the same style, and it also has the same information without semantic distortion.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Deng, Yandong Guo, Xiaodong Gu, Zhibo Chen, Quqing Chen, Charles Wang
{"title":"A Comparative Review of Aspect Ratio Conversion Methods","authors":"Z. Deng, Yandong Guo, Xiaodong Gu, Zhibo Chen, Quqing Chen, Charles Wang","doi":"10.1109/MUE.2008.112","DOIUrl":"https://doi.org/10.1109/MUE.2008.112","url":null,"abstract":"The Aspect ratio is the fractional relation of the width of a video image compared to its height. Because of the historical and some other factors, there are so many video formats with different aspect ratios and the conversion of aspect ratio is required more and more imminently. The paper introduced all the aspect ratio conversion methods published in literatures, including cropping method, expanding method and so on, and presented experiment results to demonstrate the advantages and disadvantages of each conversion method.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gui-fang Wu, Se-young Jang, Hoon-Sung Kwak, Jie-xin Pu
{"title":"A New Parameter Selection Method of Neural Network","authors":"Gui-fang Wu, Se-young Jang, Hoon-Sung Kwak, Jie-xin Pu","doi":"10.1109/MUE.2008.99","DOIUrl":"https://doi.org/10.1109/MUE.2008.99","url":null,"abstract":"A new parameter selection method of neural network is presented after researching parameter selection method of neural network deeply, and it is applied to surface defect online inspection system of cold rolled strips. The method exerted the merits of small-samples fully which was utilized to train and test neural network by every possible combination of parameters to get a group of neural network parameters by plotting histogram of recognition rate under different parameter combinations, and the parameters are regarded as optimized parameters of neural network. Experiments showed that a best recognition effect by using the parameters for neural network which are selected by the new parameter selection method can be achieved among all the parameters selected randomly for surface defect of cold rolled strips.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reflective Heterogeneous Service Coordination Middleware Based on Mobile Agents in Wireless Environments","authors":"Haiyang Hu, Hua Hu, Jing Chen","doi":"10.1109/MUE.2008.13","DOIUrl":"https://doi.org/10.1109/MUE.2008.13","url":null,"abstract":"Software services distributed in open wireless environments are implemented using different middleware types and advertised using different discovery protocols. Client application needs to adopt a flexible approach to discover and bind these services. Compared with other related work, this paper presents a new reflective coordination middleware based on mobile agent. It dynamically adapts both its binding and discovery protocol to allow interoperation with heterogeneous services by uploading different functional components. By dynamically creating subagents at run time, it can interoperate with multiple services in parallel, and as a result the client burden is released and the efficiency of the coordination process is enhanced.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Model of Adjectival Modification in Chinese and Its Automatic Construction from a Machine Readable Dictionary","authors":"Xuening Li, R. Lu, Y. Hu","doi":"10.1109/MUE.2008.71","DOIUrl":"https://doi.org/10.1109/MUE.2008.71","url":null,"abstract":"In this paper, we develop previous AVS models and propose a conceptual model to represent adjectival modification in Chinese, with the emphasis laid on its polysemy. Through a method based on rough pattern, we can extract automatically this model from the corresponding senses of adjectival entries in a machine-readable dictionary. This work belongs to a family of research into the automatic compiling of CFL pedagogical e-dictionary based on Modern Chinese Standard Dictionary.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongsheng Hao, Yuebin Xu, Guanfeng Liu, Zhenkuan Pan
{"title":"A New Grid Resource Management Mechanism Based on D-S Theory","authors":"Yongsheng Hao, Yuebin Xu, Guanfeng Liu, Zhenkuan Pan","doi":"10.1109/MUE.2008.89","DOIUrl":"https://doi.org/10.1109/MUE.2008.89","url":null,"abstract":"There may be some malicious nodes in the Grid environment because the resource of nodes can access the Grid system freely. The number and qualities of this resource can be change dramatically and optionally, so it is possible to affect the utilization of Grid resource. Hence, the trust mechanism is widely used in the management of Grid. This paper proposes a new method to detect the behaviors of resource providers in Grid environments based on D-S theory. Through simulating experiments, this mechanism can record the behaviors exactly and prevent the malicious ones. Then it gives a strong support for resource scheduling in the Grid.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}