2013 International Conference on IT Convergence and Security (ICITCS)最新文献

筛选
英文 中文
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context 一种基于copula的欺诈检测(CFD)方法在企业移动银行环境下检测规避欺诈模式
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-18 DOI: 10.1109/ICITCS.2013.6717772
Abdullah A. I. Alnajem, Ning Zhang
{"title":"A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context","authors":"Abdullah A. I. Alnajem, Ning Zhang","doi":"10.1109/ICITCS.2013.6717772","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717772","url":null,"abstract":"This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such evasive fraud patterns effectively. Using corporate m-banking (m-banking) as an application context, this paper proposes a novel fraud detection method, the CFD method, to address this open issue. The CFD method measures an aggregated fraud risk value for a given corporate m-banking transaction. Different from existing methods, which typically assume that the different marginal fraud risk factors are independent of each other, the CFD method can capture evasive fraud patterns caused by fraud risk factors that are inter-dependent or independent of each other. Evaluation results using Monte Carlo simulations showed that the CFD method is more effective in detecting evasive fraud patterns than the independence-based aggregation method.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market 移动核心银行服务器:面向大众市场的无现金、无分支和无线零售银行
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-16 DOI: 10.1109/ICITCS.2013.6717857
Insu Song, J. Vong
{"title":"Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market","authors":"Insu Song, J. Vong","doi":"10.1109/ICITCS.2013.6717857","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717857","url":null,"abstract":"Banking is essential to modern economies and nearly half of the world's people are unbanked and underserved by banks. The high operating costs of banks passed on to retail customers are driving them away who otherwise should be in the financial system. Without having access to the financial system the unbanked and rural poor have little means to engage in mainstream economic activities. A mobile phone-based banking system was designed to provide retail banking services to the world's unbanked population and rural poor of 2.2 billion based on a cashless banking system that reduces operating cost and reduces lending risks and therefore can lower the current exorbitant rates charged on retail lending and micro-credit. A core-banking server on a low-cost mobile device (an Android tablet) could serve over 15,000 micro-banking customers. The system definitely appears to be suitable for most retail banks or microfinance institutions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response 考虑实时响应的Dalvik虚拟机堆垃圾回收性能研究
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717889
Hyun-Joo Yoo, S. Kim, Min-soo Jung
{"title":"Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response","authors":"Hyun-Joo Yoo, S. Kim, Min-soo Jung","doi":"10.1109/ICITCS.2013.6717889","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717889","url":null,"abstract":"Global smartphone OS market share, accounting for more than 70 percent, based on the Linux kernel that Android native region and is a software stack consists of Java area. Android basic application architecture of a Java virtual machine via the system is processing to real-time process. Most of the Android application's configuration requires a bitmap handle, and also the network and the various sensors and consists of various processes, such as DB, and these features must be processed in real-time. Thus, at the heart of this real-time processing performance of Dalvik VM Heap Garbage Collection Techniques for managing the performance improvement is very important. In this paper, based on Android OS version changes with changes in memory management policies for applications with enhanced performance analysis technique Garbage Collection and propose research directions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Panhinda - Offline Character Recognition System for Handwritten Articles Panhinda -手写文章的离线字符识别系统
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717866
D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne
{"title":"Panhinda - Offline Character Recognition System for Handwritten Articles","authors":"D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne","doi":"10.1109/ICITCS.2013.6717866","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717866","url":null,"abstract":"This paper presents an innovative technique to recognize Handwritten Articles. Proposed system is called \"Panhinda\". The target user group for this application would be the people who are involved with a lot of paper work on a daily basis. The proposed Character Recognition system was implemented with the capability of extracting the content of an image where the mentioned content is a hand written set of words or characters. The conversion process runs as a background process without any involvement of the user. Once the conversion is completed, User gets the capability of editing the converted text as he prefers with the aid of the Panhinda editor. This document describes the techniques for enhancing the quality of the image, character segmentation, character recognition and digital dictionaries. Noise removal, angle effects and lighting conditions are done at the pre-processing phase. After getting a quality binarized image, character segmentation will be done using Horizontal and Vertical Projection Profile method. The Support Vector Machine technique will be used to recognize the characters. Digital Dictionary will be used to capture the conflicts of the output. Error correction will be done by using a combined model of noisy channel model and natural language model. By walking through above mentioned processes handwritten article image will be converted into an editable text file. Experimenting with a set of 200 sample images, scanned through the Scanner, we have achieved a maximum recognition accuracy of 99.5% with manual error correction. Compared to existing commercial OCR systems, present recognition accuracy is worth contributing. Moreover, the developed technique is computationally efficient and consumes low memory.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116627779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Key Distribution Protocol on Quantum Cryptography 量子密码学中的密钥分发协议
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717850
Kondwani Makanda, J. Jeon
{"title":"Key Distribution Protocol on Quantum Cryptography","authors":"Kondwani Makanda, J. Jeon","doi":"10.1109/ICITCS.2013.6717850","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717850","url":null,"abstract":"In this paper, we discuss some problems in modern key distribution cryptography such as Diffie-Hellman key distribution and compare with quantum key distribution cryptography which has potential of replacing the typical algorithms due to the fact that they use natural properties of physics like not being able to be cloned or copied.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Secret Signature Scheme with No Randomness Saving 无随机保存的实用秘密签名方案
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717872
Byoungcheon Lee
{"title":"Practical Secret Signature Scheme with No Randomness Saving","authors":"Byoungcheon Lee","doi":"10.1109/ICITCS.2013.6717872","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717872","url":null,"abstract":"Secret signatures, proposed by Lee textit{et al.} cite{LCYY07,LLK09}, provide signature privacy and public provability at the same time. Using these schemes a signer can send his signature secretly to a designated receiver such that only the designated receiver can verify the signature. Moreover, if any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. But in these schemes one of the drawback is that the signer has to keep the random number used in the signing algorithm for later use, i.e., to provide public provability. This is very impractical in the real world, since random numbers used in many cryptographic algorithms are generally used only once and they have to be removed safely for security reason. In this paper we amend Lee textit{et al.}'s secret signature scheme such that random number is replaced by a pseudo random number that can be computed only by the signer as a function of signer's private key and timestamp. With this change signer can compute the pseudo random number at any later time that he doesn't need to save it anymore, and it can be computed only by the signer. With this change we think that secret signature scheme becomes more practical and can be used as an important cryptographic primitive to achieve signature privacy in the real world.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126839550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Based Real Time Embedded Color Tracking Mobile Robot 基于FPGA的实时嵌入式颜色跟踪移动机器人
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717835
S. Bold, Min-A Jeong, S. Jeon, Seong-Ro Lee
{"title":"FPGA Based Real Time Embedded Color Tracking Mobile Robot","authors":"S. Bold, Min-A Jeong, S. Jeon, Seong-Ro Lee","doi":"10.1109/ICITCS.2013.6717835","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717835","url":null,"abstract":"Object tracking is an important task in CMOS camera and color tracking robot. For object tracking, a camera is often utilized to obtain information of construction vehicle motion which can then be employed in coordination controls. Therefore FPGA technology is applied to the prototypical tracking system for vehicles by using a CMOS camera to detect their color tags. We designed the proposed an architecture using VHDL and implementing the design in a Diligent Nexys2 FPGA. FPGA circuit presented in this paper can track a solid color object in a scene when it receives as input a digitized PAL/NTSC stream. Then we capture the video from a camera, process it on FPGA and then display it on a 3.2' display.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116073034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
RNA-Seq Read Simulator Using SAM Template 使用SAM模板的RNA-Seq读取模拟器
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717877
Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee
{"title":"RNA-Seq Read Simulator Using SAM Template","authors":"Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee","doi":"10.1109/ICITCS.2013.6717877","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717877","url":null,"abstract":"Sequencing technologies, which generate read segments from reference genes, have been diversified significantly with the introduction of the Next Generation Sequencer. Despite of its efficiency in terms of time and cost compared to the previous one, it is still too expensive to conduct a bunch of experiments consequently or to reflect particular biological specificity in the experimental settings. To deal with this problem, there have been developed some simulators that generates reads reflecting specific biological characteristics. However, there is still a lack of the consideration of some other important statistical quantities such as gene expression levels in read simulation. After giving a brief review on state-of-the-art read simulators focusing on their sequencing method and functional characteristics, this paper presents a new read simulation method considering gene expression structures. The proposed method extracts the statistical information from SAM files that contain read mapping results, and generates synthetic reads having the analyzed characteristics. We also demonstrate the effectiveness of the proposed method by comparing simulated data with the real data.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Lock 人脸识别锁
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717833
L. Deng, Dong-liang Lee, Yi-Jen Liu
{"title":"Face Recognition Lock","authors":"L. Deng, Dong-liang Lee, Yi-Jen Liu","doi":"10.1109/ICITCS.2013.6717833","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717833","url":null,"abstract":"In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing 基于Web服务的YOHO智能信息处理云接口代理
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717797
Sheng-Yuan Yang, Dong-liang Lee, L. Deng
{"title":"A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing","authors":"Sheng-Yuan Yang, Dong-liang Lee, L. Deng","doi":"10.1109/ICITCS.2013.6717797","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717797","url":null,"abstract":"In this paper, a cloud interface agent with Web service techniques for intelligent YOHO information processing was presented. The agent is not only able to explore related technologies in order to establish Web service platforms, but it can also investigate the construction of cloud interactive diagrams using Web service techniques for extensively and seamlessly integrating backend YOHO information systems on the Internet. The preliminary system developments and tableaux show that the research results yield positive outcomes.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信