E. H. Lu, J. Ying, Huan-Sheng Chen, K. Lin, V. Tseng, Huan-Wen Tsai, K. H. Cheng, Shun-Chieh Lin
{"title":"Simulation framework for travel trajectory generation and mobile transaction modeling","authors":"E. H. Lu, J. Ying, Huan-Sheng Chen, K. Lin, V. Tseng, Huan-Wen Tsai, K. H. Cheng, Shun-Chieh Lin","doi":"10.1109/ISIC.2012.6449721","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449721","url":null,"abstract":"In recent years, Location-Based Services (LBSs) have received a lot of attentions due to a wide range of potential applications. In such mobile applications and services, the travel recommendation system is one of popular LBSs for mobile users. More and more research studies focus on discovering of various kinds of mobile patterns from various mobile databases. In which, one of popular research issues is mining of the travel trajectory patterns from mobile travel trajectory databases. Mining travel knowledge from travel trajectory data benefits for supporting of an intelligent travel recommendation system. However, it is not easy to obtain the real travel trajectory data for mobile users since the problem of personal privacy. To develop a travel trajectory data generator is very useful for the research communities on mobile travel behavior mining. In this paper, we present a simulation framework to generate mobile travel trajectory data based on the statistics and observations of real travel information. In the simulation model, we generate not only the travel trajectories for mobile users but also the mobile transactions for each arrived attraction according to the reasonable probability designs.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two liquid-levels system control based on using PI controllers","authors":"W. Chang","doi":"10.1109/ISIC.2012.6449766","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449766","url":null,"abstract":"In this paper, we focus on the optimal design of the proportional-integral (PI) controller. The controlled plant considered here is a physical liquid-level system with two inputs and two outputs. A novel optimal algorithm called the artificial bee colony (ABC) is utilized to adjust the PI control gains such that the two liquid output responses can be regulated to some desired set points. In the meanwhile, the performance index of the system, integral squared error (ISE), is gradually minimized by using adjusting mechanisms in the ABC algorithm. Finally, simulation results demonstrate the effectiveness of the proposed method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The human-height measurement scheme by using image processing techniques","authors":"Chuin-Mu Wang, Wen-Yuan Chen","doi":"10.1109/ISIC.2012.6449737","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449737","url":null,"abstract":"There are several methods used to measure human height; it includes contact and non-contact measurements. In this research, we develop a fixed laser point triangular distance measurement (FLPTDM) method to construct a non-contact human height measurement scheme. In our scheme, a laser beam was used for signal emission, and a digital camera was used as the signal detection. We calculate the distance between the laser beam projection image and the center of the image to obtain the measured length. In addition, an offset compensation data was used to calibrate the error and improve the measurement precision. In the meantime, by adjusting the space d between the laser and digital camera, we can obtain a better measurement precision. In order to demonstrate the effectiveness of the proposed scheme, simulations under all kinds of various conditions were conducted. The experimental results show that our proposed scheme has two advantages compared with other method as follows:. 1) Our method is a very secure non-contact human height measurement. 2) Our method is a simple and novel technique; we just use a laser pointer and a camera associated with image detection techniques to obtain a precise human height measurement.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A graph split on greedy-algorithm-based Self organization protocols","authors":"Hu Yin, Y. Lv","doi":"10.1109/ISIC.2012.6449715","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449715","url":null,"abstract":"Recently, Self organization protocol has gained great focus from the research area for its efficient to save energy on wireless sensors network. We use a random graph model to compare some of the proposed self organization protocols in this thesis. Results show the impact of the surface on the percentage of the active set Thus, we focus on the graph splitting and the impact for the active set and the topology connectivity. Finally, we analyze the performance resulting for transmitted and received packets.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingying Qiao, Xiaonan Jiang, H. Lin, Jeng-Shyang Pan
{"title":"Efficient identity based threshold proxy signature scheme in cloud environment","authors":"Yingying Qiao, Xiaonan Jiang, H. Lin, Jeng-Shyang Pan","doi":"10.1109/ISIC.2012.6449706","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449706","url":null,"abstract":"Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms enable communications between user terminals and the cloud to be executed securely and in a trusted manner. In this paper, we proposed a refined efficient identity-based threshold proxy signature in the cloud environment. Our approach is not only practical but also enjoys fewer rounds of communication and less operation cost in comparison to the existing schemes. In this paper, we have also introduced the implementation of our approach in the cloud environment.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127868037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of ID-based fair proxy blind signature scheme with weak linkability","authors":"Chih-Hung Wang, Jiapeng Fan","doi":"10.1109/ISIC.2012.6449733","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449733","url":null,"abstract":"The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced by Stadler et al., in which a property of fairness was added to the ordinary blind signature scheme. The protocol provided an additional trusted third party (TTP) to prevent the abused problems. A variant scheme named the proxy blind signature scheme has been proposed which combined the advantages of the blind signature and the proxy signature. A blind signature can provide the perfect unlinkability for people to protect their privacy. However, it may be more useful for the commercial applications if the blind signature can provide a weak linkability between different message-signature pairs. Certainly, the weakly linkable blind signature must ensure that it can protect personal privacy of the requester. In this paper, we propose an ID-based fair proxy blind signature scheme with weak linkability to help the requester linking some signatures they used, but not leak his personal privacy of identity. Especially, it is the first work to combine the blind signature with the weak linkability, fairness and proxy signing techniques.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-dimension Hash index design for main-memory RFID database applications","authors":"Yung-Feng Lu, Sheng-Shang Ye","doi":"10.1109/ISIC.2012.6449708","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449708","url":null,"abstract":"A large-scale RFID application often requires an efficient index structure design for database to provide a highly efficient data processing. This paper presents a new indexing scheme, called Multi-dimension Hash index (MH index), that satisfies all the requirements of a good RFID database applications. The main idea is to provide RFID applications extremely high efficiency in data manipulations over main-memory databases. A MH-Index is constructed based on multi-dimensional attributes that are the keys of one relation. The capability of the design is implemented in an open source main-memory database system H2 and evaluated by realistic workloads of RFID applications. Comparing to other indexes, the experimental results show that the proposed index design outperforms others in execution time.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modified probability neural network indoor positioning technique","authors":"C. Chen, L. Yin, Yu-Ju Chen, R. Hwang","doi":"10.1109/ISIC.2012.6449770","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449770","url":null,"abstract":"This paper presents an indoor positioning technique using a modified probabilistic neural network (MPNN) scheme. It measures the received signal strength (RSS) between an object and stations, and then transforms the RSS into distances. A MPNN engine determines coordinate of the object with the input distances. The experiments are conducted in a realistic ZigBee sensor network. The proposed approach performs significantly better than triangulation technique when the RSS data are unstable. It can be efficiently applied to applications of location based service (LBS).","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129496265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blood vessel segmentation in retinal images based on the nonsubsampled contourlet transform","authors":"Chien-Cheng Lee, S. Ku","doi":"10.1109/ISIC.2012.6449775","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449775","url":null,"abstract":"This paper presents a method for blood vessel segmentation in retinal images based on the nonsubsampled contourlet transform (NSCT). The method uses a line detector and different directions of the NSCT subbands to detect the direction of blood vessel for each NSCT level. Then, the method computes three kinds of features using the orthogonal direction of blood vessel of the NSCT coefficients. After pixel classification, we present three kinds of post-processing procedures to correct the optic disk, the field of view mask, lesion areas, and noise. The performance is evaluated on the DRIVE database. The average accuracy of the DRIVE databases evaluation is 0.9423.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hybrid tolerant controller design and its application to the flight control","authors":"Chen Jie, M. Cunbao, Song Dong","doi":"10.1109/ISIC.2012.6449714","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449714","url":null,"abstract":"A new hybrid tolerant controller design method for linear system with input disturbance and system uncertainty is presented. Based on the proper controller fault mode definition, the passive tolerant state feedback controller design method is derived for systems which contain non-parameter uncertainties. Theoretical analysis and simulation verify the conservation of the method above, and then a new hybrid tolerant control method is given for this problem, the proposed approach is evaluated by an aircraft example, and the conclusion is validated by the simulation.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}