2011 International Conference on Information Science and Applications最新文献

筛选
英文 中文
An Image-Ordered Parallel Volume Ray Casting Using Frame Coherence 基于帧一致性的图像有序平行体光线投射
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772418
Sukhyun Lim, Daesung Lee, B. Shin
{"title":"An Image-Ordered Parallel Volume Ray Casting Using Frame Coherence","authors":"Sukhyun Lim, Daesung Lee, B. Shin","doi":"10.1109/ICISA.2011.5772418","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772418","url":null,"abstract":"For an efficient parallel volume ray casting suitable for recent multi-core CPUs, we propose an image-ordered approach by using a cost function to allocate loaded tasks impartially per each processing node. At the first frame, we divide an image space evenly, and we compute a cost function. By applying the frame coherence property, we divide the image space unevenly using the computed previous cost function since the next frame. Conventional image-ordered parallel approaches have focused on dividing and compositing volume datasets. However, the divisions and accumulations are negligible for recent multi-core CPUs because they are performed inside one physical CPU. As a result, we can reduce the rendering time without deteriorating the image quality by applying a cost function reflecting on all time-consuming steps of the volume ray casting.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Architectural Components and Design Module for Oriental Wooden Buildings 东方木结构建筑智能构件与设计模块
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772424
E. Ahn, J. W. Kim
{"title":"Intelligent Architectural Components and Design Module for Oriental Wooden Buildings","authors":"E. Ahn, J. W. Kim","doi":"10.1109/ICISA.2011.5772424","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772424","url":null,"abstract":"This paper proposes an efficient way to define architectural components to support for designing an oriental wooden building. Oriental building structure has unique coupling schemes in which components are connected with each other. In general, commercial CAD in the marketplace does not support these combining rules of oriental wooden structure. To alleviate this problem, we develop architectural components and module for designing Korean-style buildings. According to the suggested method, all components are defined with template. It means that the components can be instantiated in a various form. Consequently, the components would be transformed and reused for designing a creative and practical space by blending them with modern architectural components. In addition, the components are implemented based on BIM(Building Information Modeling) system, so CAD designer could obtain helpful information for the process of building construction.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122947918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Map Design of Bioethics Supporting 3D Visualization 支持三维可视化的生命伦理学知识图谱设计
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772365
Sung-Ja Choi, Guijung Kim, Gang-soo Lee
{"title":"Knowledge Map Design of Bioethics Supporting 3D Visualization","authors":"Sung-Ja Choi, Guijung Kim, Gang-soo Lee","doi":"10.1109/ICISA.2011.5772365","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772365","url":null,"abstract":"Today, IT convergence technologies have been used in all areas for business creation and innovation as a means. Also, bioethics in the field of IT has been combined with new business creation. But, the physician which is encountering a substantial biomedical ethics had a standard of low-bioethics. In recent years, the voice of a magnetic about biomedical ethics and medical equip is the reaction of their recent. For knowledge map construction of bioethics and organizing, we propose the bioethics contents supporting system: It has been developed in RIA environments. It has taken advantage of the 3D open-source, highly accessible and visible to bioethics content.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone Android手机利用二维码攻击SSID的新漏洞
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772367
W. Cheon, Keon il Heo, Won Gyu Lim, W. Park, T. Chung
{"title":"The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone","authors":"W. Cheon, Keon il Heo, Won Gyu Lim, W. Park, T. Chung","doi":"10.1109/ICISA.2011.5772367","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772367","url":null,"abstract":"Wireless network is one of the 2010s most important security issues. As smartphone(android) is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP have not being managed properly in terms of security, Wireless Internet users also dont recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all probe request are generated around, and brings induction of service charge and communication problems in its train.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Four-factor verification methodology for entity authentication assurance 实体认证保证的四因素验证方法
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772337
Sanghoon Jeon
{"title":"Four-factor verification methodology for entity authentication assurance","authors":"Sanghoon Jeon","doi":"10.1109/ICISA.2011.5772337","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772337","url":null,"abstract":"Abstract-In this age of the accelerated globalization and the increased mobile population, various methods of wire/wireless communication technologies and their service are converged and integrated each other as Internet Technology has been developing. As a result, functions of the devices such as a computer, a digital device, a mobile device and a smart phone have been evolving. At present, there are different types of ID card that replace the personal identification based on contact/contactless IC card. Currently, various security protocols for users' authentication are being widely and mixedly used. However, current technology is unable to guarantee the entities (human and devices) authentication assurance due to an abuse caused by loss, theft and fabrication. Therefore, a new authentication policy is needed in order to assure the authentication for both users and devices. In this paper, I propose a new framework that guarantees the authentication assurance of wire/wireless entities such as humans and devices by using proposed four-factor authentication methodologies which can provide enhanced security, efficient policy of entity authentication assurance and efficient operation.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extended Fingerprint-Based User Authentication Scheme Using Smart Cards in Education IPTV 基于智能卡的教育IPTV用户指纹认证扩展方案
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772392
Eun-A Jun, Jeom-goo Kim, SeokWon Jung, Dong Hoon Lee
{"title":"Extended Fingerprint-Based User Authentication Scheme Using Smart Cards in Education IPTV","authors":"Eun-A Jun, Jeom-goo Kim, SeokWon Jung, Dong Hoon Lee","doi":"10.1109/ICISA.2011.5772392","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772392","url":null,"abstract":"In modern society, there exist many different types of authentication processes that we are unaware of not only in IT fields but also in our daily lives. Many recent issues of cyber crimes target weak passwords or careless management of passwords. This fact proves the importance of user authentication. In this paper, a secure user authentication scheme using smart cards in IPTV and also offer, by using smart cards and bio information to ensure strong security and a secure user authentication scheme is proposed. We propose extended model of \"Fingerprint-based access control using smart card in IPTV\" suggested in the previous work. We can extend our scheme to provide contents to subscribers according to an attribute of a subscriber instead of an age by modifying the function in the registration phase. And we analyzed the security of our proposed scheme about caused by malicious attacks.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134499673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multilingual Content Management in Web Environment Web环境下的多语言内容管理
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772328
M. Arefin, Y. Morimoto, A. Yasmin
{"title":"Multilingual Content Management in Web Environment","authors":"M. Arefin, Y. Morimoto, A. Yasmin","doi":"10.1109/ICISA.2011.5772328","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772328","url":null,"abstract":"Internet has become primary medium for information access and commerce in today's globalized world and the demographics of the Internet are rapidly turning to be multilingual. Therefore, multilingual content management can be treated as a vital issue for the availability of information in the native languages of the Internet users. To provide the contents to the users in their native languages most of the current approaches keep information for each language and present user's information from the chosen language. Developing such systems is both space and time consuming and is not an efficient one. With standard HTML pages, this process involves creating and maintaining multiple versions of each page for each supported language as well as having the language content embedded into the HTML. In this paper, a multilingual content management technique that is based on natural language translation mechanism has been introduced, which can reduce the time and space of the existing systems. In the propose approach, the information is stored in a single language and the contents are translated into user's chosen language. The system has been evaluated by both syntactic data and real data obtained from a real life schema. We have compared the performance of our system with existing systems. Our system outperforms the existing systems in terms of both space and time.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Development of a Sensor Module for Real-Time Pollution Monitoring 实时污染监测传感器模块的研制
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772355
Lamling Venus Shum, P. Rajalakshmi, A. Afonja, Graeme McPhillips, R. Binions, L. Cheng, S. Hailes
{"title":"On the Development of a Sensor Module for Real-Time Pollution Monitoring","authors":"Lamling Venus Shum, P. Rajalakshmi, A. Afonja, Graeme McPhillips, R. Binions, L. Cheng, S. Hailes","doi":"10.1109/ICISA.2011.5772355","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772355","url":null,"abstract":"In a Wireless Sensor Network (WSN) application for ambient pollution monitoring, which involves the deployment of a large number (i.e. ~100) of sensors in India and UK to obtain fine-grain pollution data, the selection of gas sensors and the validity of sensor measurements against ground truth are vitally important to the success of the system. Electrochemical and solid state gas sensors are low- cost, small sensors that are traditionally used for examining exhaust emissions from vehicles, and hence, they are specifically designed to measure a much higher gas concentration than in our measured environment. In this paper, we evaluate the use of gas sensors in a pollution monitoring project using pervasive sensor technology by literature comparison of the different types of gas sensors available commercially; and a discussion on the calibration process of a set of selected Oxygen (O2), Carbon Dioxide (CO2) and Carbon Monoxide (CO) sensors. The results show that the electrochemical CO sensors exhibit linearity against the range of concentrations that we are interested in (0-20ppm). This paper presents in-depth knowledge on sensor selection and calibration against the ground truth to the research community interested in enabling practical development and deployment of WSN gas pollution monitoring systems.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service 基于独立加解密服务的云计算商业模型
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772349
Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu, Chien-Hsing Wu
{"title":"A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service","authors":"Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu, Chien-Hsing Wu","doi":"10.1109/ICISA.2011.5772349","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772349","url":null,"abstract":"Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must have a viable way to protect their clients' data, especially to prevent the data from disclosure by unauthorized insiders. Storing the data in encrypted form is a common method of information privacy protection. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This study proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext, and the party responsible for data encryption and decryption must delete all data upon the computation on encryption or decryption is complete. A CRM (Customer Relationship Management) service is described in this paper as an example to illustrate the proposed business model. The exemplary service utilizes three cloud systems, including an encryption and decryption system, a storage system, and a CRM application system. One service provider operates the encryption and decryption system while other providers operate the storage and application systems, according to the core concept of the proposed business model. This paper further includes suggestions for a multi-party Service- Level Agreement (SLA) suitable for use in the proposed business model.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Network Access Control and Management Using ARP Spoofing in Various Windows Environment Windows环境下基于ARP欺骗的网络访问控制与管理
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772376
Jang-Han Bae, Seongjin Ahn, Jinwook Chung
{"title":"Network Access Control and Management Using ARP Spoofing in Various Windows Environment","authors":"Jang-Han Bae, Seongjin Ahn, Jinwook Chung","doi":"10.1109/ICISA.2011.5772376","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772376","url":null,"abstract":"With the growth of network scale, network administrators dissipate large amounts of time and costs to manage network addresses (IP/MACs). However, the current state of IP address management can be said to be extremely inefficient. Therefore, through real time platform technology research on important apparatus that can protect network addresses, a groundbreaking measure that can improve the reliability and stability of the network and system needs to be found. This paper will analyze Network Access Control and Management as a solution to the problem stated above, the ARP protocol action process and the action process and policy changes brought about by the change in Windows versions. Ultimately this paper aims on realizing and proposing additional policies or control methods accordingly. This will make securing IP/MAC address utilization clarity, elimination of disorders arising from IP address conflicts, provision of a convenient interface for prompt IP assignment, blocking of unauthorized disclosed IP usage and swift actions against any impediments alongside Network Management Systems possible.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信