2013 International Conference on IT Convergence and Security (ICITCS)最新文献

筛选
英文 中文
Better User Protection with Mobile Identity 善用流动身份保障用户安全
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717809
D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan
{"title":"Better User Protection with Mobile Identity","authors":"D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan","doi":"10.1109/ICITCS.2013.6717809","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717809","url":null,"abstract":"So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Mobile Based Multi-Function Health Monitoring System 基于移动的多功能健康监测系统的实现
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717842
Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong
{"title":"Implementation of Mobile Based Multi-Function Health Monitoring System","authors":"Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong","doi":"10.1109/ICITCS.2013.6717842","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717842","url":null,"abstract":"We address the critical issues raised in mobile healthcare monitoring and propose a new solution to resolve respective problem. This paper presents self-developed BCG monitoring, posture correction system and respective application. A 3-loadcell chair-type BCG system which allows continuous heart status monitoring and posture correction at the office and daily life is designed and developed. The implemented 3-loadcell chair is also embedded with a Bluetooth transceiver to provide a feature of wireless monitoring. The data detected by the 3- loadcell chair is transmitted to smartphone. The transmitted data is real time monitored through an applications implemented in a smart phone.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Graphical Analysis of Mobile Computing Traffic Simulation Model 移动计算流量仿真模型的图形化分析
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717839
W. Suh
{"title":"Graphical Analysis of Mobile Computing Traffic Simulation Model","authors":"W. Suh","doi":"10.1109/ICITCS.2013.6717839","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717839","url":null,"abstract":"As more roadside and in-vehicle sensors are deployed, variety of traffic data are becoming available in real time. These real time traffic data are shared among vehicles and between vehicles and traffic management centers through wireless communication. This course of events creates an opportunity for mobile computing and online traffic simulations. This paper presents the fundamental analytical background on mobile computing based ad hoc distributed simulation model. Rollback process in the ad hoc distributed simulation is graphically described. Flow rate diagram and cumulative number of vehicle diagram shows that the overall system simulation speed and estimate accuracy may differ significantly as a function of the selected threshold. Two main criteria to measure the system's predictability are presented: 1) length of prediction horizon, that is, how far in advance of the current wall-clock time the system provides estimates and 2) how accurate the estimates are at specific prediction horizon, i.e. how accurate is the estimate (compared with the actual traffic conditions). These two criteria and the relation between logical process simulations and the real time field data driven simulation client data are graphically demonstrated as well.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs 基于电池故障早期发现的领队替换协议
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717777
Almetwally M. Mostafa, Ahmed E. Youssef
{"title":"A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs","authors":"Almetwally M. Mostafa, Ahmed E. Youssef","doi":"10.1109/ICITCS.2013.6717777","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717777","url":null,"abstract":"In cooperative Mobile Ad-hoc Networks (MANETs), copies of data are replicated on different mobile devices to increase resource accessibility and data availability. In order to preserve data consistency, a leader or authoritative control node is assigned to act as an organizer for the shared data copies. Since mobile devices have limited battery power, the leader may fail at any time. When the leader fails, another leader has to be elected to maintain data availability and consistency. Current leader election approaches in MANETs employ a notable wireless communication overhead to replace the leader. These wireless communications consume about 70% of total battery power. In this paper, we propose a novel approach to replace exhausted leader in MANETs based on the measurement of its remaining battery power early before it dies. More specifically, the proposed approach replaces the exhausted leader with a healthy one when its remaining battery power reaches a predefined threshold. Our approach has two contributions: 1) early precaution of leader power failure, 2) reducing power consumption used in leader replacement by reducing communication overhead.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile Collaborative Experiential Learning (MCEL): Personalized Formative Assessment 移动协作式体验学习(MCEL):个性化形成性评估
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717854
Insu Song, J. Vong
{"title":"Mobile Collaborative Experiential Learning (MCEL): Personalized Formative Assessment","authors":"Insu Song, J. Vong","doi":"10.1109/ICITCS.2013.6717854","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717854","url":null,"abstract":"We propose a mobile collaborative experiential learning system that students can access via mobile devices or any interactive devices connected to the Internet. The approach departs from conventional summative assessment approaches, such as reports submitted at the end of their learning sessions. Students interact with the learning system via mobile devices in order to change the state of a simulated learning lab to a desired state over time anywhere anytime to solve problems or achieve their goals. Students acquire set competency levels during their journey to achieving their goals interacting with the learning environment via mobile devices. The main objectives are to provide ownership of their journey, experiential, contextualized and formative assessment at low cost. The system features SMS/MMS biding of WSDL, SOA 2.0, and Event- Condition-Action (ECA) process modeling for easy integration with existing systems.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Instance-Based Ontology Matching with Rough Set Features Selection 基于实例的本体匹配与粗糙集特征选择
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717848
C. Yap, M. Kim
{"title":"Instance-Based Ontology Matching with Rough Set Features Selection","authors":"C. Yap, M. Kim","doi":"10.1109/ICITCS.2013.6717848","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717848","url":null,"abstract":"Ontologies are widely used in various domain such as medical, e-commerce and semantic web. However, heterogeneous ontologies are one of the main challenges in realizing the semantic interoperation in the domain of ontology. Ontology matching is proposed as the solution to realize the semantic interoperation. In general, three main categories of ontology matching strategies proposed by researchers: string based matching; structural based matching and also instance-based matching. Instances in ontology contain lot of semantic information which can be used for the matching purposes. However, some of the ontology contains superfluous concepts/classes which should be removed in order to increase the performance of matching. In this paper, an idea for instance-based matching with rough set feature selection capability approach is proposed to perform the ontology matching task and further increase the matching's efficiency is presented.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Meeting Scheduling System Using Unpleasant Notification 使用不愉快通知的会议安排系统
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717851
Tomoyuki Mishima, Kenichi Takahashi, T. Kawamura, K. Sugahara
{"title":"Meeting Scheduling System Using Unpleasant Notification","authors":"Tomoyuki Mishima, Kenichi Takahashi, T. Kawamura, K. Sugahara","doi":"10.1109/ICITCS.2013.6717851","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717851","url":null,"abstract":"We often fail to arrange the scheduling of a meeting because someone does not input his/her schedule. Therefore, we hope a system which enables users to compel the input of his/her schedule. In this paper, we propose a system to compel users to input their schedules by using unpleasant notification. The system, first, uses a general notification, such as an e-mail, to ask to input their schedules, however, the system gradually uses unpleasant notification. Thus, the users are not unpleasant if they finished to input soon. Otherwise, they become gradually unpleasant because of unpleasant notifications. By using our system repeatedly, users will tend to input their schedules rapidly to avoid to be unpleasant.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular Networks 一种用于IVI与车辆网络交互的车载数据管理框架
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717805
Kabsu Han, Insick Son, Jeonghun Cho
{"title":"An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular Networks","authors":"Kabsu Han, Insick Son, Jeonghun Cho","doi":"10.1109/ICITCS.2013.6717805","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717805","url":null,"abstract":"Data processing and networking are the key functions in an IVI system. It is an important competitive of the vehicle not only economy and safety but also application of IVI system in the automotive industry. Some automotive interfaces were developed but not adopted because of limitations and difficulty. IVI platforms are developed by automotive OEM and suppliers but not invigorated till now. In this paper, we propose simple in- vehicle data management framework. The data is transform into XML-based data that the applications in the IVI system can access easily. The data management layer is implemented in Java programming language, IVN of the real production vehicle is used to validate functionality and safety. The in-vehicle data management framework works well with native c application and HTML5 application as well as interact with IVN and mobile network in the test environment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combining Context and Content for Automatic Image Annotation on Mobile Phones 结合上下文和内容的手机图像自动标注
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717813
S. Bacha, N. Benblidia
{"title":"Combining Context and Content for Automatic Image Annotation on Mobile Phones","authors":"S. Bacha, N. Benblidia","doi":"10.1109/ICITCS.2013.6717813","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717813","url":null,"abstract":"Nowadays, the explosive use of mobile phones leads to generate a large number of personal photos. The requirements of effective image retrieval becomes evident. In this paper, we overview image retrieval techniques with special emphasis on different works that consider automatic image annotation as solution to retrieve images in mobile environment. In most automatic image annotation systems, the high-level concepts are generated based, exclusively, on visual analysis or context analysis of the image. Emerging approaches consider that the fusion of content and context analysis is beneficial for automatic image annotation. We focus in this paper on the type of information, visual and contextual, used to generate semantic that describes the image and the new methods that combine both content and context for automatic image annotation.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Enhanced Public Key Infrastructure 增强的公开密码匙基础设施
2013 International Conference on IT Convergence and Security (ICITCS) Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717801
Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau
{"title":"An Enhanced Public Key Infrastructure","authors":"Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau","doi":"10.1109/ICITCS.2013.6717801","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717801","url":null,"abstract":"In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信