{"title":"Better User Protection with Mobile Identity","authors":"D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan","doi":"10.1109/ICITCS.2013.6717809","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717809","url":null,"abstract":"So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Mobile Based Multi-Function Health Monitoring System","authors":"Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong","doi":"10.1109/ICITCS.2013.6717842","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717842","url":null,"abstract":"We address the critical issues raised in mobile healthcare monitoring and propose a new solution to resolve respective problem. This paper presents self-developed BCG monitoring, posture correction system and respective application. A 3-loadcell chair-type BCG system which allows continuous heart status monitoring and posture correction at the office and daily life is designed and developed. The implemented 3-loadcell chair is also embedded with a Bluetooth transceiver to provide a feature of wireless monitoring. The data detected by the 3- loadcell chair is transmitted to smartphone. The transmitted data is real time monitored through an applications implemented in a smart phone.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graphical Analysis of Mobile Computing Traffic Simulation Model","authors":"W. Suh","doi":"10.1109/ICITCS.2013.6717839","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717839","url":null,"abstract":"As more roadside and in-vehicle sensors are deployed, variety of traffic data are becoming available in real time. These real time traffic data are shared among vehicles and between vehicles and traffic management centers through wireless communication. This course of events creates an opportunity for mobile computing and online traffic simulations. This paper presents the fundamental analytical background on mobile computing based ad hoc distributed simulation model. Rollback process in the ad hoc distributed simulation is graphically described. Flow rate diagram and cumulative number of vehicle diagram shows that the overall system simulation speed and estimate accuracy may differ significantly as a function of the selected threshold. Two main criteria to measure the system's predictability are presented: 1) length of prediction horizon, that is, how far in advance of the current wall-clock time the system provides estimates and 2) how accurate the estimates are at specific prediction horizon, i.e. how accurate is the estimate (compared with the actual traffic conditions). These two criteria and the relation between logical process simulations and the real time field data driven simulation client data are graphically demonstrated as well.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs","authors":"Almetwally M. Mostafa, Ahmed E. Youssef","doi":"10.1109/ICITCS.2013.6717777","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717777","url":null,"abstract":"In cooperative Mobile Ad-hoc Networks (MANETs), copies of data are replicated on different mobile devices to increase resource accessibility and data availability. In order to preserve data consistency, a leader or authoritative control node is assigned to act as an organizer for the shared data copies. Since mobile devices have limited battery power, the leader may fail at any time. When the leader fails, another leader has to be elected to maintain data availability and consistency. Current leader election approaches in MANETs employ a notable wireless communication overhead to replace the leader. These wireless communications consume about 70% of total battery power. In this paper, we propose a novel approach to replace exhausted leader in MANETs based on the measurement of its remaining battery power early before it dies. More specifically, the proposed approach replaces the exhausted leader with a healthy one when its remaining battery power reaches a predefined threshold. Our approach has two contributions: 1) early precaution of leader power failure, 2) reducing power consumption used in leader replacement by reducing communication overhead.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Collaborative Experiential Learning (MCEL): Personalized Formative Assessment","authors":"Insu Song, J. Vong","doi":"10.1109/ICITCS.2013.6717854","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717854","url":null,"abstract":"We propose a mobile collaborative experiential learning system that students can access via mobile devices or any interactive devices connected to the Internet. The approach departs from conventional summative assessment approaches, such as reports submitted at the end of their learning sessions. Students interact with the learning system via mobile devices in order to change the state of a simulated learning lab to a desired state over time anywhere anytime to solve problems or achieve their goals. Students acquire set competency levels during their journey to achieving their goals interacting with the learning environment via mobile devices. The main objectives are to provide ownership of their journey, experiential, contextualized and formative assessment at low cost. The system features SMS/MMS biding of WSDL, SOA 2.0, and Event- Condition-Action (ECA) process modeling for easy integration with existing systems.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instance-Based Ontology Matching with Rough Set Features Selection","authors":"C. Yap, M. Kim","doi":"10.1109/ICITCS.2013.6717848","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717848","url":null,"abstract":"Ontologies are widely used in various domain such as medical, e-commerce and semantic web. However, heterogeneous ontologies are one of the main challenges in realizing the semantic interoperation in the domain of ontology. Ontology matching is proposed as the solution to realize the semantic interoperation. In general, three main categories of ontology matching strategies proposed by researchers: string based matching; structural based matching and also instance-based matching. Instances in ontology contain lot of semantic information which can be used for the matching purposes. However, some of the ontology contains superfluous concepts/classes which should be removed in order to increase the performance of matching. In this paper, an idea for instance-based matching with rough set feature selection capability approach is proposed to perform the ontology matching task and further increase the matching's efficiency is presented.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoyuki Mishima, Kenichi Takahashi, T. Kawamura, K. Sugahara
{"title":"Meeting Scheduling System Using Unpleasant Notification","authors":"Tomoyuki Mishima, Kenichi Takahashi, T. Kawamura, K. Sugahara","doi":"10.1109/ICITCS.2013.6717851","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717851","url":null,"abstract":"We often fail to arrange the scheduling of a meeting because someone does not input his/her schedule. Therefore, we hope a system which enables users to compel the input of his/her schedule. In this paper, we propose a system to compel users to input their schedules by using unpleasant notification. The system, first, uses a general notification, such as an e-mail, to ask to input their schedules, however, the system gradually uses unpleasant notification. Thus, the users are not unpleasant if they finished to input soon. Otherwise, they become gradually unpleasant because of unpleasant notifications. By using our system repeatedly, users will tend to input their schedules rapidly to avoid to be unpleasant.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular Networks","authors":"Kabsu Han, Insick Son, Jeonghun Cho","doi":"10.1109/ICITCS.2013.6717805","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717805","url":null,"abstract":"Data processing and networking are the key functions in an IVI system. It is an important competitive of the vehicle not only economy and safety but also application of IVI system in the automotive industry. Some automotive interfaces were developed but not adopted because of limitations and difficulty. IVI platforms are developed by automotive OEM and suppliers but not invigorated till now. In this paper, we propose simple in- vehicle data management framework. The data is transform into XML-based data that the applications in the IVI system can access easily. The data management layer is implemented in Java programming language, IVN of the real production vehicle is used to validate functionality and safety. The in-vehicle data management framework works well with native c application and HTML5 application as well as interact with IVN and mobile network in the test environment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Context and Content for Automatic Image Annotation on Mobile Phones","authors":"S. Bacha, N. Benblidia","doi":"10.1109/ICITCS.2013.6717813","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717813","url":null,"abstract":"Nowadays, the explosive use of mobile phones leads to generate a large number of personal photos. The requirements of effective image retrieval becomes evident. In this paper, we overview image retrieval techniques with special emphasis on different works that consider automatic image annotation as solution to retrieve images in mobile environment. In most automatic image annotation systems, the high-level concepts are generated based, exclusively, on visual analysis or context analysis of the image. Emerging approaches consider that the fusion of content and context analysis is beneficial for automatic image annotation. We focus in this paper on the type of information, visual and contextual, used to generate semantic that describes the image and the new methods that combine both content and context for automatic image annotation.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Public Key Infrastructure","authors":"Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau","doi":"10.1109/ICITCS.2013.6717801","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717801","url":null,"abstract":"In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}