{"title":"GameGuard: a windows-based software architecture for protecting online games against hackers","authors":"Luan Bui The, Van Nguyen Khanh","doi":"10.1145/1852611.1852643","DOIUrl":"https://doi.org/10.1145/1852611.1852643","url":null,"abstract":"We propose a software architecture and an implementation framework for protecting Windows-based online games against hackers. Our network model is between 3 parties, the game producer, the game distributor and the game player (client), where we aim to support the distributor to fight against cheater clients with minimum cooperation from the game producer. Our protection system is centered on our specifically designed module, GameGuard, which accomplishes the main protection duties while simultaneously, interacts with the GameClient program so that if a serious hack attempt is detected, both will terminate. Our two layers of protection, in hiding game modules and detecting hacks, integrated with the mechanism of auto-updating/reporting with the distributor server provide a general, powerful yet flexible approach in building hack protection products. We support the game distributors with a general protection framework which is not dependent of specific games and also only need minimum cooperation from the distant game producers. Our approach is powerful enough that we would defeat most kinds of attacks which are based on hooking Windows APIs, including ones from memory, graphic or hardware attack categories. Our GameGuard system is also robust against attacks directed at the protection modules: we achieve authenticity of our protection modules based on the authenticity of the GameClient assured by the producer. Based on our framework, we have implemented a hack protection system which is being extensively experimented at VTC, the Vietnam Multimedia Corporation, with very encouraging results.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy clustering with hedge algebra","authors":"Dinh Khac Dong, T. D. Khang, Phan Anh Phong","doi":"10.1145/1852611.1852621","DOIUrl":"https://doi.org/10.1145/1852611.1852621","url":null,"abstract":"In this paper, we propose a new approach to fuzzy clustering in order to handle the uncertainties in pattern recognition problems on the basis of conventional fuzzy C-means algorithm (FCM). In our approach, we define the concept of linguistic cluster center by employing the semantic structure of hedge algebra. This kind of cluster center is constructed to give the appropriate weights for each pattern of the dataset in our clustering algorithm. The parameters of hedge algbra are then optimized in the training process to obtain the suitable parameters for the dataset. We also incorporate the k-means algorithm to get better results in comparing to conventional FCM.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A general model for digitalizing human being's thought: MiMaS","authors":"N. Manh, Pham Quoc Vinh, Hoang Anh Viet, H. Thang","doi":"10.1145/1852611.1852615","DOIUrl":"https://doi.org/10.1145/1852611.1852615","url":null,"abstract":"A General Model For Digitalizing Human Being's Thought MIMAS proposes a general model including both hardware and software to determine and recognize some states of thinking of human. The hardware is a device that receives, pre-processes, and digitalizes brain wave signals which are then sent to the software to be processed. The software using some algorithms Independent Component Analysis, Expectation Maximization, and Gaussian mixture model classifier to process data, extract features, total up data and storage digitalized thinking of human. Our model has been experimented with over 50 persons and our accuracy is 87%.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. L. Nguyen, Y. Chahir, Michèle Molina, C. Tijus, F. Jouen
{"title":"Eye gaze tracking with free head movements using a single camera","authors":"B. L. Nguyen, Y. Chahir, Michèle Molina, C. Tijus, F. Jouen","doi":"10.1145/1852611.1852632","DOIUrl":"https://doi.org/10.1145/1852611.1852632","url":null,"abstract":"The problem of eye gaze tracking has been researched and developed for a long time. The most difficult problem in the non-intrusive system of eye gaze tracking is the problem of head movements. Some of existing methods have to use two cameras and an active infrared (IR) illumination to solve this problem. Otherwise, with a single camera, the user has to hold the head uncomfortably still when performing a session of eye gaze tracking. If the head of the user moves away from original position, the accuracy of these eye gaze-tracking systems drops dramatically. In this paper, we propose a solution using Gaussian Processes for eye gaze tracking that allows free head movements with a single camera.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of verifying web service composition","authors":"H. Thang, Quynh Pham Thi, D. Hoang","doi":"10.1145/1852611.1852641","DOIUrl":"https://doi.org/10.1145/1852611.1852641","url":null,"abstract":"Service composition is one of the primary tasks in developing service-oriented systems. However, there are currently some challenges to check its correction. In this paper, we propose a visual methodology and a tool for verifying business processes written in BPEL by using the SPIN model checker. We present algorithms to translate BPEL processes into PROMELA programs via labeled control flow graphs. The use of label control graphs in the tool will help regular users understand BPEL business processes and the verification process with a model checker more easily. Finally, the Spin model checker will verify important properties of the PROMELA program that represents a BPEL business process.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved genetic algorithm for minimum latency problem","authors":"H. Ban, N. D. Nghia","doi":"10.1145/1852611.1852614","DOIUrl":"https://doi.org/10.1145/1852611.1852614","url":null,"abstract":"Minimum Latency Problem (MLP), also known as traveling repairman problem, in general case, is proved to be NP--hard. This paper presents several new techniques based on the scheme of the genetic algorithm for solving MLP. The experimental results on the proposed algorithm show that it gives the approximation ratio which is about 1.9 times higher than the lower bound on the optimal solution.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131668394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some context fuzzy clustering methods for classification problems","authors":"B. Cuong, Le Hoang Son, Hoang Thi Minh Chau","doi":"10.1145/1852611.1852619","DOIUrl":"https://doi.org/10.1145/1852611.1852619","url":null,"abstract":"In this paper, we will propose a two-context fuzzy clustering algorithm (2C-FCM) and its parallel solution so called P2C-FCM for the classification problems. Some initial experiments show the effectiveness of P2C-FCM and 2C-FCM when comparing with traditional Context FCM. The applications of P2C-FCM and 2C-FCM are the basis to generate fuzzy rules for classifying member countries of United Nation Organization (UNO) according to the Human Development Index based on the statistics of UNO in 2005.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining global features and local minutiae descriptors in genetic algorithms for fingerprint matching","authors":"T. Le, Hoang Thien Van","doi":"10.1145/1852611.1852631","DOIUrl":"https://doi.org/10.1145/1852611.1852631","url":null,"abstract":"Fingerprint matching is an important and challenging problem in fingerprint recognition. Many approaches have been proposed for fingerprint matching such as minutiae point pattern-based techniques, orientation pattern-based techniques, ridge-based techniques, global and local features combination-based techniques (GLF-BCT). In recent research, GLF-BCT methods achieved good performance even when a large portion of fingerprints in the database are of poor quality. In this paper, we would like to improve the GLF-BCT model using Genetic Algorithm (GA) that we aim to achieve higher efficiency in fingerprint recognition. In detail, the proposed model is a combination of the advantage of local minutiae descriptors (ability of increasing the distinctiveness degree between two different fingerprint images) with the advantage of the global features (identifying the optimal or near optimal global alignment between two fingerprints) to improve the reliability of GA fitness assignment in fingerprint matching. This method is called the Fingerprint Matching based on Combining Global features and Local minutiae Descriptors in Genetic Algorithms (FM-CGLD-GA). The experimental results on the FVC2004 database show the effectiveness and superiority of the proposed method in comparing to other approaches.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for Vietnamese text normalization to improve the quality of speech synthesis","authors":"Thu Nguyen, T. Pham, D. Tran","doi":"10.1145/1852611.1852627","DOIUrl":"https://doi.org/10.1145/1852611.1852627","url":null,"abstract":"Being necessary for a Text-To-Speech (TTS) system, text-normalization is general a challenging problem, especially for Vietnamese because of the local context. Recent researches in text-normalization in Vietnamese for TTS systems are still at the beginning with very simple sets of ad hoc rules for individual cases in spite of the ambiguity of real text. The purpose of this paper is to take some initial steps towards methodically normalizing input text in Vietnamese for a TTS system. This paper proposes a categorization and a normalization model for Vietnamese text based on related results for other languages. An experimental application is implemented to demonstrate the model, which uses several techniques including letter language model and decision trees for classifying NSWs and both supervised and unsupervised approaches for expanding abbreviations.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An electronic health application for disaster recovery","authors":"Edmundo Chissungo, H. Le, E. Blake","doi":"10.1145/1852611.1852637","DOIUrl":"https://doi.org/10.1145/1852611.1852637","url":null,"abstract":"Natural disasters often destroy the fixed wired communications infrastructure. Therefore relying on such infrastructure after a catastrophe can be risky. Wireless Mesh Networks (WMNs) can provide wireless network coverage without relying on a wired backbone infrastructure or dedicated access points. In this paper, we focus on using WMNs in disaster recovery areas in order to disseminate information from patient to doctors. We investigate whether we can deploy an electronic-health application on top of an ad hoc peer to peer network. The initial prototype shows that it is feasible. However the application quality varies depending on the number of multi-hops and the applications concurrently running on top of the WMN networks.","PeriodicalId":388053,"journal":{"name":"Proceedings of the 1st Symposium on Information and Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}