P. Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma
{"title":"Security in Wireless Mesh Networks: Challenges and Solutions","authors":"P. Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma","doi":"10.1109/ITNG.2009.20","DOIUrl":"https://doi.org/10.1109/ITNG.2009.20","url":null,"abstract":"Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with the internet. WMN represents a whole new network concept and because of the nature of wireless and multi-hop, the security vulnerabilities have become crucial problems. Therefore, specified security mechanism should be introduced. The research on the key security theories and detection to intrusion of WMN has become of great significance both theoretically and empirically. This article starts from the introduction of the basic organization and characteristics of WMN, presenting major security problems and key security approach gradually to the reader, and concludes with the comparison of several secure routing protocols.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information","authors":"Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu","doi":"10.1109/ITNG.2009.22","DOIUrl":"https://doi.org/10.1109/ITNG.2009.22","url":null,"abstract":"Recently the multi-model recognition has been considered the development trend for the fast-developing biological recognition technology. Taking humanity cranio-maxillo-facial as the target, a novel recognition method is proposed in this paper. Starting from the mathematical model based on extracting characteristic parameters, the types of characteristic parameters is determined, and the features of different parameters are analyzed. Meanwhile the computational method of related parameters has been completed. Finally, a new recognition algorithm based on these parameters is proposed and our preliminary simulation results indicate that this algorithm is effective.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Movies and Television Shows Using Motion","authors":"Mark S. Smith, R. Hashemi, L. Sears","doi":"10.1109/ITNG.2009.250","DOIUrl":"https://doi.org/10.1109/ITNG.2009.250","url":null,"abstract":"An innovative technique used for categorizing motion pictures and television shows based on motion activity is presented. First, scenes extracted from digitally stored movies and television programs are segmented into separate clips based on various editing effects such as hard cuts, fades and dissolves. Next,the initial frame of the sequence is automatically segmented into meaningful objects using color and texture features using any image segmentation algorithm chosen by the author. An object tracking algorithm utilizing motion is then applied to each Intra (I) frame and each Predicted (P) frame in the video sequence. Interesting objects undergoing the highest degree of motion are then automatically selected for additional analysis. The distance between corresponding object’s centroids existing in adjacent frames is computed for each interesting object. These distances are then used in classifying the clip as being an action or non-action video.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying a Composite Process Framework (CPF) in Real Life Software Development Project","authors":"Mohammed Al-Maharmeh, B. Unhelkar","doi":"10.1109/ITNG.2009.145","DOIUrl":"https://doi.org/10.1109/ITNG.2009.145","url":null,"abstract":"This paper presents the outcome of an action research study that was conducted to validate the application of a Composite Process Framework (CPF) in real life software development project. This research extends an existing application software development methodology to incorporate the composite process framework and tailor it to meet the needs of a particular software development project. This paper also discusses the importance of the agile approach to software development and its role in the CPF. This is so because the CPF aims a proper balance of ceremony and agility in a project - based on an argument that no single ‘type’ of process appears to be suitable for software development projects.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance","authors":"L. Tuan, Yuan Luo","doi":"10.1109/ITNG.2009.68","DOIUrl":"https://doi.org/10.1109/ITNG.2009.68","url":null,"abstract":"In Ad hoc On-Demand Distance Vector (AODV) protocol, once an on-demand link is established, it only maintains that link and does not care about any other paths. AODV may not use some more optimal or reserved paths which occur later but may improve its current transfer. We modify AODV that each node uses routing information provided by the new neighbor nodes to find out and update to better paths and create accumulated routes for later use. Our modeling results in NS2 show that the approach can create more optimal routes and significantly improve the performance with high mobility and traffic level network in term of delay and packet delivery ratio.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to Socialize","authors":"Alejandro Aguirre, M. Rodríguez, Á. G. Andrade","doi":"10.1109/ITNG.2009.310","DOIUrl":"https://doi.org/10.1109/ITNG.2009.310","url":null,"abstract":"We report on the design of a home-based ubiquitous computing system that helps elders to prevent and reduce the onset of depression by managing their social lifestyle with the family members. We propose that through a Social Calendar, elders are encouraged to socialize by receiving invitations and suggestions generated by the system when it detects that in the last two weeks the communication patterns with one or more of their children have been altered, or that it has detected those elders may have a symptom of depression.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles","authors":"Jianping Quan, Guoqiang Bai","doi":"10.1109/ITNG.2009.185","DOIUrl":"https://doi.org/10.1109/ITNG.2009.185","url":null,"abstract":"Recently DPA resistant logic styles are of great concern. As far as we know, each kind of logic style has its own drawbacks. Masking logic styles can easily be attacked by the template attack. For dual-rail logic styles, TDPL can only keep the total power consumption of the whole cycle constant; as for WDDL, it becomes more and more difficult to efficiently match the interconnect capacitances of differential wires with shrinking feature sizes. To avoid these drawbacks, we present a new direction for routing effort to solve the unbalanced interconnection problem. By using Three-phase logic and removing the load dependent power consumption in the evaluation phase and discharge phase, our logic style is insensitive to the unbalanced interconnect capacitances of differential wires. Additionally, the early propagation effect is another threat to certain DPA resistant logic styles. We also propose a theoretical method to solve it at the system level.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123580508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID","authors":"R. Watanabe, Toshiaki Tanaka","doi":"10.1109/ITNG.2009.111","DOIUrl":"https://doi.org/10.1109/ITNG.2009.111","url":null,"abstract":"OpenID authentication is a method to provide a single sign-on (SSO) service among Internet service sites. OpenID has been widely adopted by blog sites because of its usability and ease of implementation. However, the assurance of the ID in OpenID authentication is a concern because currently anyone can hold accounts on an OpenID provider (OP) simply by sending a registration mail and OPs usually do not check to confirm the real identity of their applicants. In contrast, a telephone company checks the identity of their mobile service users before a contract is completed by referring to such credentials as a driver’s license or passport. Therefore, on a cellular phone, the ID, such as subscriber ID, is assured by the contract process and telephone companies can trace the user’s identity through the ID. In this paper, we propose a federation authentication scheme between Open ID and a cellular phone in order to assure the ID of the OpenID. In addition, by using the cellular phone at user authentication for each service use, secure authentication is also provided.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post-processing of Multiview Images: Depth Scaling","authors":"Manbae Kim","doi":"10.1109/ITNG.2009.110","DOIUrl":"https://doi.org/10.1109/ITNG.2009.110","url":null,"abstract":"The post processing of multiview images is one of new fields. Among them, a depth scaling is an important research. In this paper, we present a depth scaling method for multiview images that could provide an effective control of stereoscopic depth range. Unlike the previous works that change a camera configuration, our proposed method utilizes depth data in order to carry out the scaling of a depth range requested by users. In particular, our method can deal with multiview images captured by multiple cameras, and can be expanded from stereoscopic to multiview images. Our experimental results tested on automultiscopic 3D displays show that the perceived depth is appropriately scaled according to a user’s preferred depth. To prove this, DQCQS (Double Stimulus Continuous Quality Scale) subjective test is performed. The mean evaluation value of ten subjects is varied proportional to a scale factor.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mark Bilandzic, Daniel Filonik, Michael Gross, A. Hackel, H. Mangesius, H. Krcmar
{"title":"A Mobile Application to Support Phatic Communication in the Hybrid Space","authors":"Mark Bilandzic, Daniel Filonik, Michael Gross, A. Hackel, H. Mangesius, H. Krcmar","doi":"10.1109/ITNG.2009.261","DOIUrl":"https://doi.org/10.1109/ITNG.2009.261","url":null,"abstract":"This paper presents a prototype implementation of the PengYo application that offers a cross-platform interaction method between an online social community and mobile users based on the “beeping” phenomenon. PengYo provides a novel interface that explicitly supports the practice of beeping, a nearly-globally applied implicit communication method of calling somebody and hanging up before the call is answered. In contrast to the traditional beeping-method, PengYo provides a custom tailored user interface and user interaction style for beeping, following the real-life cognitive model of “tapping someone on the shoulder”. PengYo builds a platform for further investigation of the beeping phenomenon and its usage patterns, that very little research has been done on so far. The results of further research studies that base on PengYo might deliver crucial information for redesigning and enhancing existing channels following the user-led communication phenomenon of beeping.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}