K. Thongkhome, Chalermwat Thanavijitpun, S. Choomchuay
{"title":"A FPGA design of AES core architecture for portable hard disk","authors":"K. Thongkhome, Chalermwat Thanavijitpun, S. Choomchuay","doi":"10.1109/JCSSE.2011.5930124","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930124","url":null,"abstract":"This paper describes a high effective AES core hardware architecture for implementing it to encrypt/decrypt the data in portable hard disk drive system that apply to effectively in the terms of speed, scale size and power consumption to comply with minimum speed of 5 Gbps (USB3.0). We proposed the 128 bits data path of two different AES architectures design, Basic Iterative AES, which reuses the same hardware for all the ten iterations and, One Stage Sub Pipelined AES, with one stage of outer pipelining in the data blocks that both of them are purely 128 bits data path architecture that different from the previous public paper. The implementation result on the targeted FPGA, the basic iterative AES encryption can offer the throughput of 3.85 Gbps at 300 MHz and one stage sub pipelined AES can offer the throughput to increase the efficiency of 6.2 Gbps at 481 MHz clock speed.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property","authors":"Y. Permpoontanalarp, Apichai Changkhanak","doi":"10.1109/JCSSE.2011.5930095","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930095","url":null,"abstract":"The TMN protocol is a secure key exchange protocol for mobile communication system. Its security has been analyzed thoroughly by many approaches, and many attacks have been found. Recently, we have developed a new Coloured Petri Net (CPN) approach to analyze cryptographic protocols, and then applied it to analyze the TMN protocol with the homomorphic property of the underlying public-key encryption. As preliminary analyses, we found two new attacks of the protocol. In this paper, we extend our previous works in two aspects. Firstly, we compare the performance between our new method and a traditional method to analyze attacks in cryptographic protocols. Surprisingly, our method is more efficient when the number of states and traces are large. Secondly, we found three new and interesting variants of our previous attacks.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Miyamura, S. Ohzahata, Y. Shinano, Ryuhei Miyashiro
{"title":"Adaptive view-dependent tree graph visualization","authors":"H. Miyamura, S. Ohzahata, Y. Shinano, Ryuhei Miyashiro","doi":"10.1109/JCSSE.2011.5930118","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930118","url":null,"abstract":"This paper proposes an adaptive visualization technique for representing a large-scale hierarchical dataset within a limited display space. A hierarchical dataset has nodes and links that reveal the parent-child relationship between the nodes. These nodes and links are described using graphics primitives. When the number of these primitives is large, it is difficult to recognize the structure of the hierarchical data because several primitives overlap within a display space. In order To overcome this difficulty, we propose an adaptive visualization technique for hierarchical datasets. The proposed technique selects an appropriate graph style according to the nodal density in each area.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison study of Flickr's folksonomies and ontologies","authors":"Rachanee Ungrangsi, Chutiporn Anutariya","doi":"10.1109/JCSSE.2011.5930131","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930131","url":null,"abstract":"Flickr is a widely-known Web 2.0 photo sharing system that allows users to describe their own photos with tags (aka. folksonomies) for indexing purposes. However, its tag-based photo retrieval function is severely hampered by the inherent nature of folksonomies. As the first step moving towards the alleviation of the problem, this paper, therefore, investigates characterizations of folksonomies on Flickr through its all-time most popular tags. In particular, the study focuses on tag clusters, related tags, and tag categorizations of the all-time most popular tags and compares them with concepts formally defined in ontologies from the Semantic Web. The experimental results imply the feasibilit of employing the Semantic Web technology in searching Flickr photos.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134357868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personal Cloud Filesystem: A distributed unification filesystem for personal computer and portable device","authors":"Smith Dhumbumroong, K. Piromsopa","doi":"10.1109/JCSSE.2011.5930094","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930094","url":null,"abstract":"This paper describes Personal Cloud Filesystem, a modular userspace filesystem framework for accessing and manipulating data on multiple remote computers or mobile devices. One of its novelty is that it uses mechanisms similar to those employed by unification filesystem to present a unified view of files and folders from remote machines to user. This allows data from multiple remote sources to appear as if they reside together locally in the filesystem's mount point. It also supports offline operation by automatically caches frequently use data for offline usage. Benchmark results from prototype have shown acceptable performance, despite the increased overhead.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XCourEva: XML-based course evaluation system","authors":"S. Chatvichienchai","doi":"10.1109/JCSSE.2011.5930147","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930147","url":null,"abstract":"This paper describes XCourEva, a new Web-based course evaluation system. XCourEva is intended to assist administrative staff in defining a default questionnaire for each academic unit as well as additional customized questionnaires for individual instructors. The advantages include easy development and maintenance of the default and additional questionnaires, automatic generation of Web pages for filling out a questionnaire using XL, and bi-directional communication between the instructor and anonymous students. Analysis of course evaluation results from various points of view is aided by automatically® generated summaries, and a Microsoft Excel spreadsheet is generated that presents a consolidate view of students' feedback on the courseware.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game-based analysis of eavesdropping defense strategy in WMN with directional antenna","authors":"Pat Boonyakarn, Patrachart Komolkiti, C. Aswakul","doi":"10.1109/JCSSE.2011.5930085","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930085","url":null,"abstract":"This paper is concerned with the framework for finding the optimal stochastic routing to defend intelligent eavesdropping attacks in the Wireless Mesh Network (WMN) with a cone-based, directional antenna. A game-theoretical model is used to find the best strategy to maximize the expected number of secure sessions (ES) under the most severe circumstance. In particular, the WMN has been modeled by the two-person constant-sum game with two players, namely, a network defender and a network eavesdropper. Numerical results show that the enhancement of antenna directionality by decreasing the beamwidth can help improve ESS only in the sufficiently large network case of downlink. In addition, the optimal defending strategy at the proposed game equilibrium has been found to give a better ESS improvement in the downlink case than in the uplink case.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117118682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ngamsuriyaroj, Chatchai Sirichamchaikul, Suparat Hanam, Techat Tatsanaboonya
{"title":"Patient information exchange via web services in HL 7 v3 for two different healthcare systems","authors":"S. Ngamsuriyaroj, Chatchai Sirichamchaikul, Suparat Hanam, Techat Tatsanaboonya","doi":"10.1109/JCSSE.2011.5930158","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930158","url":null,"abstract":"Healthcare information systems (HIS) have been widely developed and deployed in several countries. In Thailand, there are two popular HIS systems: one is HCIS and the other is HOSxP. HCIS are currently the most deployed system since it is developed for use in all small health units in rural areas by the Ministry of Public Health of Thailand. HOSxP is another popular open source HIS used in mid-size hospitals. Both systems use different database systems, and their entity names are also different even for the same data. When patient data needs to be referred from one HIS to another, the problem is how to transfer such data in a correct, convenient and efficient way. This paper proposes a solution to transfer basic patient information from HCIS to HOSxP using the standard HL 7 version 3 message exchange, which is the new standard for exchanging healthcare information. We design and implement the patient information exchange system using Mirth Connect and the web service technology. Our system is demonstrated only for patient and visit information exchange from HCIS to HOSxP, and it works for both PC and mobile phones that can be connected to the Internet.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"927 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pulse inversion linear bandpass filter for detecting subharmonic from microbubbles","authors":"C. Samakee, P. Phukpattaranont","doi":"10.1109/JCSSE.2011.5930110","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930110","url":null,"abstract":"Subharmonic imaging promises to improve ultrasound imaging quality due to an increasing contrast-to-tissue ratio (CTR). However, to improve image quality, signal processing techniques for maximizing subharmonic signal are needed. In this work, we present the pulse inversion linear bandpass filter (PILBF) method for detection of sub harmonic components in order to separate signals from microbubble contrast agent echoes. This method is based on the combination between pulse inversion (PI) and linear bandpass filter (LBF) methods. While PI without LBF produces CTR 54 dB, the PILBF produces 82 dB enhancement. The high CTR value confirms the generation of high quality image.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of using variant differential evolutions on optimizing 2-level self-organizing map","authors":"P. Julrode, S. Supratid","doi":"10.1109/JCSSE.2011.5930106","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930106","url":null,"abstract":"Self-organizing map (SOM) is a very powerful tool for automatic detection of relevant clusters. The extended version of SOM, two-level self-organizing map (2LSOM) was introduced for improving SOM clustering in explorative manner. However, structural methods for efficiently confirming the competent optimization of 2LSOM initialization are lacking. Due to the important advantages over other optimization algorithms belonging to differential evolution (DE) approach, this paper investigates the utilization of the original DE as well as the variations, here called VarDEl and VarDE2 as tools for optimizing the initial cluster weights of 2LSOM. Such investigated approaches are respectively so called DE+2LSOM, VarDE1+2LSOM and VarDE2+2LSOM. With respect to the different choices of mutation process, both variant DEs would get better accuracy than the original one. More elitism on mutation process is involved with VarDE2+2LSOM rather than with VarDE1+2LSOM; whilst the most random mutation is applied by DE+2LSOM. lO-fold cross validation experiments are taken on real-world and artificial data sets with an identified number of clusters. Within the scope of this paper, the investigation results point out the better clustering performance of the variant DEs, VarDE2+2LSOM over the related approaches.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}