2015 International Conference on Computer Application Technologies最新文献

筛选
英文 中文
Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services 基于NFC的公共Wi-Fi用户帐号发放系统的实现
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.36
Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki
{"title":"Implementation of a User Account Provisioning System Based on NFC for Public Wi-Fi Services","authors":"Yu-Ichiro Nobu, Keiji Takeda, H. Yamaki","doi":"10.1109/CCATS.2015.36","DOIUrl":"https://doi.org/10.1109/CCATS.2015.36","url":null,"abstract":"For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication information is performed as man-in-the-middle attack during message exchange process for authentication. In Near-Field Communication(NFC), it is hard for adversary to get between communicators. In this paper, to achieve a user account provisioning of public Wi-Fi services based on NFC, we propose a secure system for both service providers and users.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating the Location of Individual Stem Using LiDAR Imagery 利用激光雷达图像估计单个茎的位置
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.48
K. Kimura, Shitaro Goto
{"title":"Estimating the Location of Individual Stem Using LiDAR Imagery","authors":"K. Kimura, Shitaro Goto","doi":"10.1109/CCATS.2015.48","DOIUrl":"https://doi.org/10.1109/CCATS.2015.48","url":null,"abstract":"For REDD+ (Reduction of Emission from Deforestation and forest Degradation) and the Kyoto Protocol, the methodology for a wide range in a short time forest measurement, high-resolution measurement, LiDAR (Lightning Detection and Ranging) will be a powerful tool. In this study, the interpolation method, low-pass filtering, Local Maximum Filter method, and Watershed method were used to estimate the individual stem. Following the comparison of the estimation result of individual stem using LiDAR vs the measured values, the result of accuracy evaluation is 93%.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding 利用ICT的新商业模式研究:众筹的现状与挑战
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.51
T. Saisho
{"title":"A Study on New Business Models of Utilize ICT: Current Situation and Challenge on Crowd Funding","authors":"T. Saisho","doi":"10.1109/CCATS.2015.51","DOIUrl":"https://doi.org/10.1109/CCATS.2015.51","url":null,"abstract":"In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing in such companies is crowdfunding. In this paper, as a new business model that leverages the ICT, it was discussed realities and challenges of crowdfunding.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Production of Spinal Cord Injury Model Using a Cartesian Robot 用直角机器人制作脊髓损伤模型
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.43
Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun
{"title":"Production of Spinal Cord Injury Model Using a Cartesian Robot","authors":"Chul-Ung Kang, Ki-Chol Sim, Yungcheo l Byun","doi":"10.1109/CCATS.2015.43","DOIUrl":"https://doi.org/10.1109/CCATS.2015.43","url":null,"abstract":"One of the most important aspects for producing experimental animals is the reproducibility. We simulated the functional aspect of our device by using electric cylinder and a Cartesian coordinate robot. In the experiment to analyze the results, we could control the power amount using impactor to produce models we want, which means the suitability and reproducibility to produce experimental animals can be high.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examination of Transformation Technique from Real World to ANIME World 从现实世界到动漫世界的转换技术考察
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.40
Satoshi Cho, Hisashi Sato
{"title":"Examination of Transformation Technique from Real World to ANIME World","authors":"Satoshi Cho, Hisashi Sato","doi":"10.1109/CCATS.2015.40","DOIUrl":"https://doi.org/10.1109/CCATS.2015.40","url":null,"abstract":"This paper presents the results of transformation technique from real world to animation world. The animation rarely just adopts real information. In many cases, a creator converts it into a form suitable for an animation. We examined the cause about transformation of information from the real world to the animation world in a past study. Approach of the existing transformation: Approach to apply the expression of the animation to a video, Approach to transform real movement data into data for animations, Approach to transform real model data to the model data for animations. From these approaches, we examined a transformation method. By these approaches, I concluded that the exaggeration of the characteristic was an important element. We converted real information into a form suitable for an animation under the condition and concluded that I could use it. The condition is a judgment and the choice of the characteristic.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Astronomical Image Data Analysis in the Cloud 云中的天文图像数据分析
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.19
F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya
{"title":"Astronomical Image Data Analysis in the Cloud","authors":"F. J. De La Mora Garcia, T. Hochin, Hiroki Nomiya","doi":"10.1109/CCATS.2015.19","DOIUrl":"https://doi.org/10.1109/CCATS.2015.19","url":null,"abstract":"Earth sciences and space exploration instrument sensors are getting improved with each iteration providing us with bigger and more detailed sets of data. Though current available archiving and processing mechanisms are able to cope with current rates, forecasted enormous rates of data to be transmitted on a daily basis by each of the different instruments to be available on the near future make imperative to design mechanisms to handle, process, archive and search through the datasets as well as tools that lead to efficient data triage.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Near and Far Infrared Vision for Biometric Applications 近、远红外视觉在生物识别中的应用比较
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.17
Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen
{"title":"Comparison of Near and Far Infrared Vision for Biometric Applications","authors":"Elnaz Mazandarani, U. Lucke, Kaori Yoshida, M. Koppen","doi":"10.1109/CCATS.2015.17","DOIUrl":"https://doi.org/10.1109/CCATS.2015.17","url":null,"abstract":"In this paper, we provide the idea of analyzing the infrared vein patterns in the back of the hand combined with the appendant optical picture of the back of the hand for biometric purposes. We present results of an experiment which will demonstrate differences between near infrared and far infrared images as initial images for creating templates for biometrical purposes. Near infrared images offer a good quality for extracting hand veins on the one hand but contain no thermographic information as far infrared images do. The idea of this paper is to make counterfeit more difficult by using the infrared image with thermographic information and the appendant optical image with spatial information. That is why only far infrared images are useable in this case. This Paper will show a possibility to create a biometrical template based on far infrared images.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Ordering Problem for Juggling 杂耍的最优排序问题
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.45
Yusuke Sato, Satoshi Takahashi
{"title":"An Optimal Ordering Problem for Juggling","authors":"Yusuke Sato, Satoshi Takahashi","doi":"10.1109/CCATS.2015.45","DOIUrl":"https://doi.org/10.1109/CCATS.2015.45","url":null,"abstract":"The juggling is a one of physical skills involving the manipulation of objects for recreation, entertainment, art, or sport. In our research, we focus on the toss juggling. Our research is a mathematical modeling for optimal ordering for toss juggling.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consideration about the Preservation Method in the Log Files 关于日志文件保存方法的考虑
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.12
Takashi Sakuma
{"title":"Consideration about the Preservation Method in the Log Files","authors":"Takashi Sakuma","doi":"10.1109/CCATS.2015.12","DOIUrl":"https://doi.org/10.1109/CCATS.2015.12","url":null,"abstract":"In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Wifi Services Based on the IEEE802.11u Standard 基于IEEE802.11u标准的Wifi业务集成
2015 International Conference on Computer Application Technologies Pub Date : 2015-08-31 DOI: 10.1109/CCATS.2015.39
H. Yamaki, Yuki Yamada, Yuichi Kato, Eiko Kobayashi, Yu Saotome, Daisuke Matsumoto
{"title":"Integration of Wifi Services Based on the IEEE802.11u Standard","authors":"H. Yamaki, Yuki Yamada, Yuichi Kato, Eiko Kobayashi, Yu Saotome, Daisuke Matsumoto","doi":"10.1109/CCATS.2015.39","DOIUrl":"https://doi.org/10.1109/CCATS.2015.39","url":null,"abstract":"This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual access points which is normal solution, a larger number of services can be integrated into an access point without degrading the performance of network access services. The method, the implementation a prototype system and the result of performance test are described.","PeriodicalId":433684,"journal":{"name":"2015 International Conference on Computer Application Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信