{"title":"Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services","authors":"Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki","doi":"10.1109/CCATS.2015.36","DOIUrl":"https://doi.org/10.1109/CCATS.2015.36","url":null,"abstract":"For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication information is performed as man-in-the-middle attack during message exchange process for authentication. In Near-Field Communication(NFC), it is hard for adversary to get between communicators. In this paper, to achieve a user account provisioning of public Wi-Fi services based on NFC, we propose a secure system for both service providers and users.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating the Location of Individual Stem Using LiDAR Imagery","authors":"K. Kimura, Shitaro Goto","doi":"10.1109/CCATS.2015.48","DOIUrl":"https://doi.org/10.1109/CCATS.2015.48","url":null,"abstract":"For REDD+ (Reduction of Emission from Deforestation and forest Degradation) and the Kyoto Protocol, the methodology for a wide range in a short time forest measurement, high-resolution measurement, LiDAR (Lightning Detection and Ranging) will be a powerful tool. In this study, the interpolation method, low-pass filtering, Local Maximum Filter method, and Watershed method were used to estimate the individual stem. Following the comparison of the estimation result of individual stem using LiDAR vs the measured values, the result of accuracy evaluation is 93%.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding","authors":"T. Saisho","doi":"10.1109/CCATS.2015.51","DOIUrl":"https://doi.org/10.1109/CCATS.2015.51","url":null,"abstract":"In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing in such companies is crowdfunding. In this paper, as a new business model that leverages the ICT, it was discussed realities and challenges of crowdfunding.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Production of Spinal Cord Injury Model Using a Cartesian Robot","authors":"Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun","doi":"10.1109/CCATS.2015.43","DOIUrl":"https://doi.org/10.1109/CCATS.2015.43","url":null,"abstract":"One of the most important aspects for producing experimental animals is the reproducibility. We simulated the functional aspect of our device by using electric cylinder and a Cartesian coordinate robot. In the experiment to analyze the results, we could control the power amount using impactor to produce models we want, which means the suitability and reproducibility to produce experimental animals can be high.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examination of Transformation Technique from Real World to ANIME World","authors":"Satoshi Cho, Hisashi Sato","doi":"10.1109/CCATS.2015.40","DOIUrl":"https://doi.org/10.1109/CCATS.2015.40","url":null,"abstract":"This paper presents the results of transformation technique from real world to animation world. The animation rarely just adopts real information. In many cases, a creator converts it into a form suitable for an animation. We examined the cause about transformation of information from the real world to the animation world in a past study. Approach of the existing transformation: Approach to apply the expression of the animation to a video, Approach to transform real movement data into data for animations, Approach to transform real model data to the model data for animations. From these approaches, we examined a transformation method. By these approaches, I concluded that the exaggeration of the characteristic was an important element. We converted real information into a form suitable for an animation under the condition and concluded that I could use it. The condition is a judgment and the choice of the characteristic.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Astronomical Image Data Analysis in the Cloud","authors":"F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya","doi":"10.1109/CCATS.2015.19","DOIUrl":"https://doi.org/10.1109/CCATS.2015.19","url":null,"abstract":"Earth sciences and space exploration instrument sensors are getting improved with each iteration providing us with bigger and more detailed sets of data. Though current available archiving and processing mechanisms are able to cope with current rates, forecasted enormous rates of data to be transmitted on a daily basis by each of the different instruments to be available on the near future make imperative to design mechanisms to handle, process, archive and search through the datasets as well as tools that lead to efficient data triage.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen
{"title":"Comparison of Near and Far Infrared Vision for Biometric Applications","authors":"Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen","doi":"10.1109/CCATS.2015.17","DOIUrl":"https://doi.org/10.1109/CCATS.2015.17","url":null,"abstract":"In this paper, we provide the idea of analyzing the infrared vein patterns in the back of the hand combined with the appendant optical picture of the back of the hand for biometric purposes. We present results of an experiment which will demonstrate differences between near infrared and far infrared images as initial images for creating templates for biometrical purposes. Near infrared images offer a good quality for extracting hand veins on the one hand but contain no thermographic information as far infrared images do. The idea of this paper is to make counterfeit more difficult by using the infrared image with thermographic information and the appendant optical image with spatial information. That is why only far infrared images are useable in this case. This Paper will show a possibility to create a biometrical template based on far infrared images.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Ordering Problem for Juggling","authors":"Yusuke Sato, Satoshi Takahashi","doi":"10.1109/CCATS.2015.45","DOIUrl":"https://doi.org/10.1109/CCATS.2015.45","url":null,"abstract":"The juggling is a one of physical skills involving the manipulation of objects for recreation, entertainment, art, or sport. In our research, we focus on the toss juggling. Our research is a mathematical modeling for optimal ordering for toss juggling.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consideration about the Preservation Method in the Log Files","authors":"Takashi Sakuma","doi":"10.1109/CCATS.2015.12","DOIUrl":"https://doi.org/10.1109/CCATS.2015.12","url":null,"abstract":"In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Wifi Services Based on the IEEE802.11u Standard","authors":"H. Yamaki, Yuki Yamada, Yuichi Kato, Eiko Kobayashi, Yu Saotome, Daisuke Matsumoto","doi":"10.1109/CCATS.2015.39","DOIUrl":"https://doi.org/10.1109/CCATS.2015.39","url":null,"abstract":"This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual access points which is normal solution, a larger number of services can be integrated into an access point without degrading the performance of network access services. The method, the implementation a prototype system and the result of performance test are described.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}