{"title":"Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services","authors":"Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki","doi":"10.1109/CCATS.2015.36","DOIUrl":"https://doi.org/10.1109/CCATS.2015.36","url":null,"abstract":"For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication information is performed as man-in-the-middle attack during message exchange process for authentication. In Near-Field Communication(NFC), it is hard for adversary to get between communicators. In this paper, to achieve a user account provisioning of public Wi-Fi services based on NFC, we propose a secure system for both service providers and users.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating the Location of Individual Stem Using LiDAR Imagery","authors":"K. Kimura, Shitaro Goto","doi":"10.1109/CCATS.2015.48","DOIUrl":"https://doi.org/10.1109/CCATS.2015.48","url":null,"abstract":"For REDD+ (Reduction of Emission from Deforestation and forest Degradation) and the Kyoto Protocol, the methodology for a wide range in a short time forest measurement, high-resolution measurement, LiDAR (Lightning Detection and Ranging) will be a powerful tool. In this study, the interpolation method, low-pass filtering, Local Maximum Filter method, and Watershed method were used to estimate the individual stem. Following the comparison of the estimation result of individual stem using LiDAR vs the measured values, the result of accuracy evaluation is 93%.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding","authors":"T. Saisho","doi":"10.1109/CCATS.2015.51","DOIUrl":"https://doi.org/10.1109/CCATS.2015.51","url":null,"abstract":"In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing in such companies is crowdfunding. In this paper, as a new business model that leverages the ICT, it was discussed realities and challenges of crowdfunding.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Production of Spinal Cord Injury Model Using a Cartesian Robot","authors":"Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun","doi":"10.1109/CCATS.2015.43","DOIUrl":"https://doi.org/10.1109/CCATS.2015.43","url":null,"abstract":"One of the most important aspects for producing experimental animals is the reproducibility. We simulated the functional aspect of our device by using electric cylinder and a Cartesian coordinate robot. In the experiment to analyze the results, we could control the power amount using impactor to produce models we want, which means the suitability and reproducibility to produce experimental animals can be high.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examination of Transformation Technique from Real World to ANIME World","authors":"Satoshi Cho, Hisashi Sato","doi":"10.1109/CCATS.2015.40","DOIUrl":"https://doi.org/10.1109/CCATS.2015.40","url":null,"abstract":"This paper presents the results of transformation technique from real world to animation world. The animation rarely just adopts real information. In many cases, a creator converts it into a form suitable for an animation. We examined the cause about transformation of information from the real world to the animation world in a past study. Approach of the existing transformation: Approach to apply the expression of the animation to a video, Approach to transform real movement data into data for animations, Approach to transform real model data to the model data for animations. From these approaches, we examined a transformation method. By these approaches, I concluded that the exaggeration of the characteristic was an important element. We converted real information into a form suitable for an animation under the condition and concluded that I could use it. The condition is a judgment and the choice of the characteristic.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Astronomical Image Data Analysis in the Cloud","authors":"F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya","doi":"10.1109/CCATS.2015.19","DOIUrl":"https://doi.org/10.1109/CCATS.2015.19","url":null,"abstract":"Earth sciences and space exploration instrument sensors are getting improved with each iteration providing us with bigger and more detailed sets of data. Though current available archiving and processing mechanisms are able to cope with current rates, forecasted enormous rates of data to be transmitted on a daily basis by each of the different instruments to be available on the near future make imperative to design mechanisms to handle, process, archive and search through the datasets as well as tools that lead to efficient data triage.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen
{"title":"Comparison of Near and Far Infrared Vision for Biometric Applications","authors":"Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen","doi":"10.1109/CCATS.2015.17","DOIUrl":"https://doi.org/10.1109/CCATS.2015.17","url":null,"abstract":"In this paper, we provide the idea of analyzing the infrared vein patterns in the back of the hand combined with the appendant optical picture of the back of the hand for biometric purposes. We present results of an experiment which will demonstrate differences between near infrared and far infrared images as initial images for creating templates for biometrical purposes. Near infrared images offer a good quality for extracting hand veins on the one hand but contain no thermographic information as far infrared images do. The idea of this paper is to make counterfeit more difficult by using the infrared image with thermographic information and the appendant optical image with spatial information. That is why only far infrared images are useable in this case. This Paper will show a possibility to create a biometrical template based on far infrared images.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Ordering Problem for Juggling","authors":"Yusuke Sato, Satoshi Takahashi","doi":"10.1109/CCATS.2015.45","DOIUrl":"https://doi.org/10.1109/CCATS.2015.45","url":null,"abstract":"The juggling is a one of physical skills involving the manipulation of objects for recreation, entertainment, art, or sport. In our research, we focus on the toss juggling. Our research is a mathematical modeling for optimal ordering for toss juggling.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consideration about the Preservation Method in the Log Files","authors":"Takashi Sakuma","doi":"10.1109/CCATS.2015.12","DOIUrl":"https://doi.org/10.1109/CCATS.2015.12","url":null,"abstract":"In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual Retrieval of Pictures and Sounds on the Web Based on Impression","authors":"Y. Takahashi, T. Hochin, Hiroki Nomiya","doi":"10.1109/CCATS.2015.29","DOIUrl":"https://doi.org/10.1109/CCATS.2015.29","url":null,"abstract":"This paper shows the system mutually retrieving pictures and sound clips based on their impressions. Pictures (sound clips, respectively) are retrieved by specifying a music clip (picture). Pictures (sound clips) having similar impression to a sound clip (picture) are retrieved. No words are required in retrieving them. To this end, the scores of the factors representing the impression of pictures and sound clips are used. This paper shows the estimation methods of the scores of the factors of pictures and sound clips. The factor scores estimated from the feature values of pictures and sound clips by using the estimation formulas are used in the retrieval. It is shown that the prototype system could mutually retrieve pictures and sound clips on the web successfully.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}