2014 International Conference on IT Convergence and Security (ICITCS)最新文献

筛选
英文 中文
Study on Datamining Techinique for Foot Disease Prediction 足病预测数据挖掘技术研究
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021816
Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim
{"title":"Study on Datamining Techinique for Foot Disease Prediction","authors":"Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim","doi":"10.1109/ICITCS.2014.7021816","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021816","url":null,"abstract":"Datamining is a method to focus on important and meaningful knowledge in large data. Decision tree, one of typical technique in datamining, is process to predict a couple of subgroup from object group by observing relation. The purpose of the study was to find out significant knowledge between two complex disease and symptoms in clinical data of the Foot clinic by decision tree. The first medical examination clinical data of 400 patients diagnosed with complex disease were used for analysis. A dependent variable was composed of four complex disease groups. Independent variables were selected with 14 variables closely related to disease. After object data were divided into training data and test data, C5.0 algorithm was applied for analysis. In conclusion, 13 diagnosis rules were created and major symptom information was verified. On the basis of this study, other decision tree algorithms will be applied to develop additional model and perform comparison analysis for producing an ideal model from now on.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of Custom-Made Insoles on Pes Cavus During Walking 定制鞋垫对足跖足步行的影响
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021768
Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim
{"title":"Evaluation of Custom-Made Insoles on Pes Cavus During Walking","authors":"Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim","doi":"10.1109/ICITCS.2014.7021768","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021768","url":null,"abstract":"From a subject group of pes cavus, the purpose of this study was to evaluate the biomechanical characteristics of lower limbs, based on plantar foot pressure and electromyography (EMG) activities, by the effects on two kind of custom-made insoles. Ten individuals among thirty females with a clinical diagnosis of idiopathic pes cavus were selected for the study. Method: The plantar foot pressure data and EMG activities of four lower limb muscles were collected, when subjects walked on a treadmill, under three different experimental conditions. The plantar foot pressure data was analyzed, after the bilateral foot was divided into three areas of masks, to compare plantar foot pressure. The EMG activities were analyzed for integrated EMG (IEMG) value. The results show that plantar foot pressure concentrated in particular parts is decreased by custom-made insoles. In the case of EMG, all the muscle activities de-creased significantly. Thus, the result of this study can be applied for designing functional insoles and lower extremity orthoses for individuals with pes cavus.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Moving Detection Methodology in Mobile Cloud Environment 移动云环境下一种高效的移动检测方法
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021730
Changhee Cho, Sang-huyn Park, Jinsul Kim, Sang-Joon Lee
{"title":"An Efficient Moving Detection Methodology in Mobile Cloud Environment","authors":"Changhee Cho, Sang-huyn Park, Jinsul Kim, Sang-Joon Lee","doi":"10.1109/ICITCS.2014.7021730","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021730","url":null,"abstract":"In this paper, an optimal motion-sensing technique of indoor children's accident prevention system has been developed. There is a drawback in the existing detection algorithm due to the environment in a manner that recognizes the difference between the 1% and more frames of motion recognition accuracy. The proposed motion detection method is based on the background modeling technique to improve the accuracy. The method is obtained using the technique to solve the recognition errors arising from the surrounding environment. We are easy to recognize the danger area using mobile cloud-based smartphone, and provide notification to tell, remote control when children access to danger area. Also, for people to recognize the size of the minimum recognition (blob) to be able to adjust the children and to recognize accurately, we improve the existing algorithms. Through the experiments, based on an improved algorithm, we derived the optimal value for children.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JPEG-AR Standard Enabling Augmented Marketing JPEG-AR标准支持增强营销
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021784
Min-Uk Kim, Kyoungro Yoon
{"title":"JPEG-AR Standard Enabling Augmented Marketing","authors":"Min-Uk Kim, Kyoungro Yoon","doi":"10.1109/ICITCS.2014.7021784","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021784","url":null,"abstract":"Everything has been digitized nowadays. We can take a photo and share it through social networks in digitized form, such as JPEG format. Augmented Reality (AR) is a view of real world mixed with virtual objects/world. This virtual object can also be some information composed of digitized objects. Due to the advent of software and hardware, AR applications are rapidly developed and distributed to many application domains, such as commerce, education, entertainment, gaming, etc. Despite of these efforts, AR market has not grown well due to the absence of standardized metadata, interface, and concepts. To solve these problems JPEG AR standardization has been started in 2012. In this paper, we propose an augmented marketing service scenario which is compliant with JPEG-AR standard.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats 针对零日威胁的木马静态特征提取方法研究
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021794
Azhar Javed, M. Akhlaq
{"title":"On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats","authors":"Azhar Javed, M. Akhlaq","doi":"10.1109/ICITCS.2014.7021794","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021794","url":null,"abstract":"Over the past few years, the enormous challenge ever faced by cyber space is to combat against cyber threats in the shape of malware attacks. Of these, Trojans stands out as the most common choice due to its deceptive and alluring properties. Most of the modern / sophisticated malwares are polymorphic in nature, thus signature / heuristics based techniques are becoming out of scope in outraging zero-day threats. By and large Trojan and its numerous variants have common static features which are always existent in such malwares. By exploiting this analogy, a set of features is determined by analyzing known samples which can be effectively plied for combating against zero-day attacks launched by means of unknown malicious codes.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology 基于ISO/IEC 15118的电动汽车充电技术安全漏洞分析及对策研究
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021815
Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon
{"title":"Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology","authors":"Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon","doi":"10.1109/ICITCS.2014.7021815","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021815","url":null,"abstract":"Electric vehicle, which is one of the major components and research areas of Smartgrid, has been considered as one way of reducing greenhouse gas. ISO/IEC 15118 standard defines data and communication interface to charge electric vehicles. The data is used in communication between electric vehicles and power charging infrastructure. In this paper, the security vulnerabilities of ISO/IEC 15118 standard based charging technology are analyzed, and the countermeasures for them are proposed.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management Application 在移动Web众包灾难管理应用程序的背景下,通过UX验证UI
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021823
M. R. Estuar, Marlene M. De Leon, M. D. Santos, John Owen F. Ilagan, Barbara Anne May
{"title":"Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management Application","authors":"M. R. Estuar, Marlene M. De Leon, M. D. Santos, John Owen F. Ilagan, Barbara Anne May","doi":"10.1109/ICITCS.2014.7021823","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021823","url":null,"abstract":"A significant role of good user interface design is to enhance user experience. Keywords and icons are heavily used in mobile applications because of the limited screen size and small keypad interface. In creating a mobile based crowdsourcing application to motivate citizens to report disaster events and experiences, use of keywords and icons should be intuitive, have high recall and make reporting accurate. This paper discusses the user validation results of user interface design through user experience measured by intuitiveness, recall, and accuracy. For keywords, results showed that keywords were appropriate however there is a need to include selection of multiple keywords as well as language translated into native tongue. For icons, intuitiveness score were relatively high for most icons. Icons that had low recognition were because of multiple interpretations. Recall scores increased significantly after training. Enhancing user experience using simulation scenarios increased responsiveness but decreased correct submissions. This study shows that engagement increases if simulations depict real scenarios making the system relevant to its intended users.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Impact of Clock Frequency and Number of Cores on GPU Performance 时钟频率和核数对GPU性能的影响
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021776
H. Choi, D. Son, C. Kim, Jong Myron Kim Kim
{"title":"Impact of Clock Frequency and Number of Cores on GPU Performance","authors":"H. Choi, D. Son, C. Kim, Jong Myron Kim Kim","doi":"10.1109/ICITCS.2014.7021776","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021776","url":null,"abstract":"Modern graphics processing units (GPUs) containing massive parallel hardware have become more flexible with unified shader cores which can run diverse graphics operations. Moreover, programmers can run general-purpose applications on GPUs easily, since GPU vendors provide user-friendly application programming interfaces (APIs). Many studies for improving system performance using GPUs have been researched intensively. Study on the GPU architecture is challenging, because the GPU architecture is totally different to the traditional CPU architecture. This paper analyzes the GPU performance according to GPU parameters with various number of cores and clock frequency. According to our simulations, the GPU performance improves by 125.8% and 16.2% on average as the number of cores and clock frequency increase, respectively. However, the performance is saturated when memory system cannot service the data requests efficiently, resulting in memory bottleneck. Consequently, memory bottleneck problem should be considered for efficient GPU architecture design.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on Secure Element for Smartwork 智能工作安全元件的研究
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021722
Hwan-Seok Yang, S. Yoo
{"title":"A Study on Secure Element for Smartwork","authors":"Hwan-Seok Yang, S. Yoo","doi":"10.1109/ICITCS.2014.7021722","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021722","url":null,"abstract":"In recent years, computing environment has changed a lot by rapid development of computing technology and adoption of cloud computing is increasing. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. But, large inhibitory factor is that various security problems by new information technology applied in smartwork environment can occur and smartwork is vulnerable to information leaks. In this paper, we look at smart network security element for the activation of the smartwork environment and organize to prepare in security vulnerabilities. The content present in this paper is applied to comprehensive security model.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotation Invariant Detection Using Image Identifier 使用图像标识符的旋转不变性检测
2014 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021807
T. Ishikawa, Je-Ho Park
{"title":"Rotation Invariant Detection Using Image Identifier","authors":"T. Ishikawa, Je-Ho Park","doi":"10.1109/ICITCS.2014.7021807","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021807","url":null,"abstract":"When identification metadata for images in a massive database contains necessary information for detection of rotation of an image, it would be quite efficient in terms of image database management and detection of duplicated images. In this paper, we discuss how the image identifiers can be used for detection of rotated duplicates of an image and provide the experimental results. From the experimental evaluation, we conjecture that our proposed image identifier can be utilized for the given objective effectively.","PeriodicalId":318094,"journal":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信