{"title":"An Intuitive Computer Forensic Method by Timestamp Changing Patterns","authors":"Gyusang Cho","doi":"10.1109/IMIS.2014.92","DOIUrl":"https://doi.org/10.1109/IMIS.2014.92","url":null,"abstract":"This proposes an intuitive computer forensic method by timestamp changing patterns of operations on file in Windows NTFS file system. It categorized by seven file operations and has ten distinguishable patterns by their timestamp changes. The distinct timestamp changing patterns make decision on identifying what kind of file operation is performed. Some patterns are easily identified by their distinct timestamp feature intuitively, and some patterns are needed past timestamp to identify the file operation clearly, and some patterns have ambiguity with similar timestamp patterns. With some performed cases, the forensic method is tested and presented for its usage.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Modeling of IP-based Hierarchical Mobility Management Protocols","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.58","DOIUrl":"https://doi.org/10.1109/IMIS.2014.58","url":null,"abstract":"Cost-effective mobility management for roaming mobile users is very important in providing seamless service on next-generation wireless networks (NGWNs). Various IPv6-based mobility management schemes have been developed which are directly involved with data transfer from Mobile Node (MN). In this paper, two methods for analyzing mobility management schemes are proposed and the signaling transfer and packet delivery procedures for each mobility management scheme are analyzed. The signaling costs of the mobility management schemes are calculated, and the cost of each protocol is analyzed numerically. Our performance evaluation results revealed that the network-based mobility management scheme yields better performance in terms of overall cost.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of Selected Future Internet Architectures: A Survey","authors":"R. Khondoker, Beny Nugraha, R. Marx, K. Bayarou","doi":"10.1109/IMIS.2014.62","DOIUrl":"https://doi.org/10.1109/IMIS.2014.62","url":null,"abstract":"The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host-centric addressing, mobility, self-configuration, self-monitoring, and security. Several Future Internet (FI) architectures have been proposed to address these challenges including expressive Internet Architecture (XIA), Mobility First, Named Data Networking (NDN), NEBULA, and Recursive Inter Network Architecture (RINA). This paper surveys the security solutions of the FIarchitectures based on literatures, prototypes, and demonstrations. It has been found that none of the architectures can fulfill all of the security goals: confidentiality, authentication, integrity and availability. The results of the survey have been verified by the domain experts.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120946024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Imbalance Data Classification Based on MapReduce for Traffic Accident Prediction","authors":"Seong-hun Park, Young-guk Ha","doi":"10.1109/IMIS.2014.6","DOIUrl":"https://doi.org/10.1109/IMIS.2014.6","url":null,"abstract":"In modern society, our everyday life has a close connection with traffic issues. One of the most burning issues is about predicting traffic accidents. Predicting accidents on the road can be achieved by classification analysis, a data mining procedure requiring enough data to build a learning model. Regarding building such a predicting system, there are several problems. It requires lots of hardware resources to collect traffic data and analyze it for predicting traffic accidents since the data is very huge. Furthermore, data related to traffic accidents is few comparing with data which is not related to them. The numbers of two types of data are imbalanced. The purpose of this paper is to build a predicting model that can resolve all these problems. This paper suggests using Hadoop framework to process and analyze big traffic data efficiently and a sampling method to resolve the problem of data imbalance. Based on this, the predicting system, first of all, preprocess traffic big data and analyzes it to create data for the learning system. The imbalance of created data is corrected by a sampling method. To improve predicting accuracy, corrected data is classified into several groups, to which classification analysis is applied. These analysis steps are processed by Hadoop framework.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
June Kim, Youngseop Kim, Yong-Hwan Lee, Oh-Jin Kwon, Bonam Kim
{"title":"Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity Map","authors":"June Kim, Youngseop Kim, Yong-Hwan Lee, Oh-Jin Kwon, Bonam Kim","doi":"10.1109/IMIS.2014.25","DOIUrl":"https://doi.org/10.1109/IMIS.2014.25","url":null,"abstract":"H.264/AVC, the international video coding standard developed by ITU-T VCEG and ISO/IEC MPEG, is known to be more efficient than other standards. Higher compression is provided with the parameter block mode of H.264/AVC, but due to its low compression efficiency, researchers tend to ignore the algorithm's intra-prediction coding capability. This study examined this overlooked aspect to determine its impact on compression efficiency and identify potential adverse effects. This paper proposes a novel algorithm to boost efficiency using an activity map for the pixel unit of respective prediction block in conjunction with specific thresholds. Experimental results reveal that compared to the existing H.264/AVC algorithm, the proposed algorithm shows a significant improvement of over 0.35% in the compression efficiency without any increase in overall encoding time and PSNR complexity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Management Systems","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/IMIS.2014.23","DOIUrl":"https://doi.org/10.1109/IMIS.2014.23","url":null,"abstract":"Computer interpretation and description of the data can be used in the tasks aimed to perform the semantic analysis of particular information. This paper will present a new classes of cognitive information systems supporting various interpretation tasks, as well as analysis and management of data, based on the semantic meaning. Such information systems may be very useful in the tasks supporting interpretation, and management of information in different economical application. The aim of the semantic analysis in cognitive systems, is to identify those factors and characteristics of the analyzed information, the basis of which it is possible to carry out processes of explicit economic information analysis, and forecasting future enterprises states and business characteristics.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116670470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Does the Ratio and Part-Time Situation of Independent Directors Affect Firm Performance?","authors":"Ying-Li Lin, Hsiu-Feng Huang, Shu Chen Chen","doi":"10.1109/IMIS.2014.85","DOIUrl":"https://doi.org/10.1109/IMIS.2014.85","url":null,"abstract":"Firms with good corporate governance and enterprise have robust systems in order to enhance business performance. Government formulates laws for the purpose of preventing malpractice arising from lack of good corporate governance. This paper intends to examine how the ratio and part-time situation of independent directors affect firm performance. Empirical results show that ratio of independent directors seats has significant impact on non-electronic industry. As for the electronics industry, the more part-time situation of independent directors, the more detraction from the effectiveness of supervision, Non-electronic industry, on the contrary, the more independent directors part-time situation, the better corporate performance.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PasDroid: Real-Time Security Enhancement for Android","authors":"S. W. Hsiao, Shih-Hao Hung, Roger Chien, C. Yeh","doi":"10.1109/IMIS.2014.28","DOIUrl":"https://doi.org/10.1109/IMIS.2014.28","url":null,"abstract":"As the number of Android devices increased dramatically in recent years, the number of malware targeted for Android also has spiked up. Among the security risks brought by or the consequences caused by Android malware, the leakage of sensitive information becomes the majority. Current Android system only offers users a permission granting mechanism in the application installation time. Although some vendors place further mechanisms to let users grant or revoke the permissions at any time, the users still cannot distinguish if any data have been normally transmitted or intentionally leaked by the applications. Based on Taint Droid, we created a real-time security scheme on Android, called PasDroid, to trace dubious data flow and to alert the users with information for judging if a transmission should be allowed or not.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121784677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross-Layer Design Scheme Based on Integrated Management Applied in Wireless Communication","authors":"L. Yao, Fei Song, Hongke Zhang","doi":"10.1109/IMIS.2014.96","DOIUrl":"https://doi.org/10.1109/IMIS.2014.96","url":null,"abstract":"The article's central objective is to solve the mobility problem in wireless communications. In the service acquiring process of mobile terminals, wireless communications are asking more requirements for mobile handover. This paper proposes a Cross-layer Scheme based on Integrated Mobility Management (CSIMM) to reduce the handover latency and provide the high transmission performance. The main idea is to realize the uniform authentication and trigger the association of MAC layer and IP layer at the same time by incorporating the Control And Provisioning of Wireless Access Points and Proxy Mobile Internet Protocol version 6. A mathematical model is developed as well. The performance results show that our scheme is superior to those existing inter-domain handover methods in the term of the access and handover latency.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122370168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study on the Performance of Electronic Reservation Services","authors":"M. Huang, Zhaoxi Liu, Perng-Fei Huang","doi":"10.1109/IMIS.2014.81","DOIUrl":"https://doi.org/10.1109/IMIS.2014.81","url":null,"abstract":"This study aims to understand how customers perceive the value of the electronic reservation services and how the perception influences their acceptance intention toward the services. Four potential factors (perceived ease of use, usefulness, negativity, and compatibility) are incorporated to examine their impacts on customers' acceptance of the three electronic reservation services (Internet, telephone, and interactive voice response). The comparisons among the three reservation services about their relative position in each influencing factor are also evaluated. Liner regression and ANOVA were employed to analyze data among 140 usable surveys. The results reveal that perceived ease of use, usefulness, negativity, and compatibility are all related to customers' acceptance of the three electronic services. However, perceived negativity turns to insignificant when considering all the variables simultaneously. The results also indicate that telephone is the least and Internet is the most negative tool for making reservations.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}