{"title":"A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context","authors":"Abdullah A. I. Alnajem, Ning Zhang","doi":"10.1109/ICITCS.2013.6717772","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717772","url":null,"abstract":"This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such evasive fraud patterns effectively. Using corporate m-banking (m-banking) as an application context, this paper proposes a novel fraud detection method, the CFD method, to address this open issue. The CFD method measures an aggregated fraud risk value for a given corporate m-banking transaction. Different from existing methods, which typically assume that the different marginal fraud risk factors are independent of each other, the CFD method can capture evasive fraud patterns caused by fraud risk factors that are inter-dependent or independent of each other. Evaluation results using Monte Carlo simulations showed that the CFD method is more effective in detecting evasive fraud patterns than the independence-based aggregation method.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market","authors":"Insu Song, J. Vong","doi":"10.1109/ICITCS.2013.6717857","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717857","url":null,"abstract":"Banking is essential to modern economies and nearly half of the world's people are unbanked and underserved by banks. The high operating costs of banks passed on to retail customers are driving them away who otherwise should be in the financial system. Without having access to the financial system the unbanked and rural poor have little means to engage in mainstream economic activities. A mobile phone-based banking system was designed to provide retail banking services to the world's unbanked population and rural poor of 2.2 billion based on a cashless banking system that reduces operating cost and reduces lending risks and therefore can lower the current exorbitant rates charged on retail lending and micro-credit. A core-banking server on a low-cost mobile device (an Android tablet) could serve over 15,000 micro-banking customers. The system definitely appears to be suitable for most retail banks or microfinance institutions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response","authors":"Hyun-Joo Yoo, S. Kim, Min-soo Jung","doi":"10.1109/ICITCS.2013.6717889","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717889","url":null,"abstract":"Global smartphone OS market share, accounting for more than 70 percent, based on the Linux kernel that Android native region and is a software stack consists of Java area. Android basic application architecture of a Java virtual machine via the system is processing to real-time process. Most of the Android application's configuration requires a bitmap handle, and also the network and the various sensors and consists of various processes, such as DB, and these features must be processed in real-time. Thus, at the heart of this real-time processing performance of Dalvik VM Heap Garbage Collection Techniques for managing the performance improvement is very important. In this paper, based on Android OS version changes with changes in memory management policies for applications with enhanced performance analysis technique Garbage Collection and propose research directions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne
{"title":"Panhinda - Offline Character Recognition System for Handwritten Articles","authors":"D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne","doi":"10.1109/ICITCS.2013.6717866","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717866","url":null,"abstract":"This paper presents an innovative technique to recognize Handwritten Articles. Proposed system is called \"Panhinda\". The target user group for this application would be the people who are involved with a lot of paper work on a daily basis. The proposed Character Recognition system was implemented with the capability of extracting the content of an image where the mentioned content is a hand written set of words or characters. The conversion process runs as a background process without any involvement of the user. Once the conversion is completed, User gets the capability of editing the converted text as he prefers with the aid of the Panhinda editor. This document describes the techniques for enhancing the quality of the image, character segmentation, character recognition and digital dictionaries. Noise removal, angle effects and lighting conditions are done at the pre-processing phase. After getting a quality binarized image, character segmentation will be done using Horizontal and Vertical Projection Profile method. The Support Vector Machine technique will be used to recognize the characters. Digital Dictionary will be used to capture the conflicts of the output. Error correction will be done by using a combined model of noisy channel model and natural language model. By walking through above mentioned processes handwritten article image will be converted into an editable text file. Experimenting with a set of 200 sample images, scanned through the Scanner, we have achieved a maximum recognition accuracy of 99.5% with manual error correction. Compared to existing commercial OCR systems, present recognition accuracy is worth contributing. Moreover, the developed technique is computationally efficient and consumes low memory.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116627779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Distribution Protocol on Quantum Cryptography","authors":"Kondwani Makanda, J. Jeon","doi":"10.1109/ICITCS.2013.6717850","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717850","url":null,"abstract":"In this paper, we discuss some problems in modern key distribution cryptography such as Diffie-Hellman key distribution and compare with quantum key distribution cryptography which has potential of replacing the typical algorithms due to the fact that they use natural properties of physics like not being able to be cloned or copied.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Secret Signature Scheme with No Randomness Saving","authors":"Byoungcheon Lee","doi":"10.1109/ICITCS.2013.6717872","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717872","url":null,"abstract":"Secret signatures, proposed by Lee textit{et al.} cite{LCYY07,LLK09}, provide signature privacy and public provability at the same time. Using these schemes a signer can send his signature secretly to a designated receiver such that only the designated receiver can verify the signature. Moreover, if any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. But in these schemes one of the drawback is that the signer has to keep the random number used in the signing algorithm for later use, i.e., to provide public provability. This is very impractical in the real world, since random numbers used in many cryptographic algorithms are generally used only once and they have to be removed safely for security reason. In this paper we amend Lee textit{et al.}'s secret signature scheme such that random number is replaced by a pseudo random number that can be computed only by the signer as a function of signer's private key and timestamp. With this change signer can compute the pseudo random number at any later time that he doesn't need to save it anymore, and it can be computed only by the signer. With this change we think that secret signature scheme becomes more practical and can be used as an important cryptographic primitive to achieve signature privacy in the real world.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126839550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Based Real Time Embedded Color Tracking Mobile Robot","authors":"S. Bold, Min-A Jeong, S. Jeon, Seong-Ro Lee","doi":"10.1109/ICITCS.2013.6717835","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717835","url":null,"abstract":"Object tracking is an important task in CMOS camera and color tracking robot. For object tracking, a camera is often utilized to obtain information of construction vehicle motion which can then be employed in coordination controls. Therefore FPGA technology is applied to the prototypical tracking system for vehicles by using a CMOS camera to detect their color tags. We designed the proposed an architecture using VHDL and implementing the design in a Diligent Nexys2 FPGA. FPGA circuit presented in this paper can track a solid color object in a scene when it receives as input a digitized PAL/NTSC stream. Then we capture the video from a camera, process it on FPGA and then display it on a 3.2' display.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116073034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee
{"title":"RNA-Seq Read Simulator Using SAM Template","authors":"Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee","doi":"10.1109/ICITCS.2013.6717877","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717877","url":null,"abstract":"Sequencing technologies, which generate read segments from reference genes, have been diversified significantly with the introduction of the Next Generation Sequencer. Despite of its efficiency in terms of time and cost compared to the previous one, it is still too expensive to conduct a bunch of experiments consequently or to reflect particular biological specificity in the experimental settings. To deal with this problem, there have been developed some simulators that generates reads reflecting specific biological characteristics. However, there is still a lack of the consideration of some other important statistical quantities such as gene expression levels in read simulation. After giving a brief review on state-of-the-art read simulators focusing on their sequencing method and functional characteristics, this paper presents a new read simulation method considering gene expression structures. The proposed method extracts the statistical information from SAM files that contain read mapping results, and generates synthetic reads having the analyzed characteristics. We also demonstrate the effectiveness of the proposed method by comparing simulated data with the real data.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Lock","authors":"L. Deng, Dong-liang Lee, Yi-Jen Liu","doi":"10.1109/ICITCS.2013.6717833","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717833","url":null,"abstract":"In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing","authors":"Sheng-Yuan Yang, Dong-liang Lee, L. Deng","doi":"10.1109/ICITCS.2013.6717797","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717797","url":null,"abstract":"In this paper, a cloud interface agent with Web service techniques for intelligent YOHO information processing was presented. The agent is not only able to explore related technologies in order to establish Web service platforms, but it can also investigate the construction of cloud interactive diagrams using Web service techniques for extensively and seamlessly integrating backend YOHO information systems on the Internet. The preliminary system developments and tableaux show that the research results yield positive outcomes.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}