By Topic

2010 International Conference on Information Science and Applications

21-23 April 2010

Filter Results

Displaying Results 1 - 25 of 110
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Greetings General Chair

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Greetings General Co-Chair

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s):3 - 7
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Paper list

    Publication Year: 2010, Page(s):8 - 13
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • 3D CAPTCHA: A Next Generation of the CAPTCHA

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (986 KB) | HTML iconHTML

    Nowadays, the Internet is now becoming a part of our everyday lives. Many services, including Email, search engine, and web board on Internet, are provided with free of charge and unintentionally turns them into vulnerability services. Many software robots or, in short term, bots are developed with purpose to use such services illegally and automatically. Thus, web sites employ human authenticatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CRT-Based BCH Encoding and FPGA Implementation

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Additional coding gain of about 0.6 dB is observed for binary BCH codes compared to RS codes with similar code rate and codeword length under AWGN channel. This paper presents a new CRT-based (Chinese Remainder Theorem) BCH encoding. CRT-based encoding method has higher speed than original LFSR encoding method. An encoding scheme is proposed which makes trade-off between resource usage and speed p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design of Embedding Rewiring into Routing for FPGA Improvement

    Publication Year: 2010, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Rewiring is a useful technique that perturbs the logic of Look-Up Tables (LUTs) without changing the functions of circuits. This internal logic perturbation can be used to trade for critical LUT-external logic/wire removals for EDA improvements. In this paper, we design a flow of embedding the rewiring engine into routing process for FPGA improvement. In our design, we change the priorities of tar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Financial Tool for Software Risk Measurement

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Risk measurement of the software projects is presented based on analogies with financial risk measure models. Financial risk measure models assign a monetary value to a risk event to gauge the financial impact of the risk event on the financial investment. Estimated software cost is modeled as a financial investment and financial risk measure models are adopted to measure the monetary loss due to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV Environments

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    In IPTV environments, a user authentication is an important security primitive to check the validity of membership. Authentication schemes between a smart card and set-top-box (STB) for authenticating users have been proposed in IPTV environment. Since many contents contain classifiable elements such as violence, sex, coarse language, themes and drug use, we should classify contents with ages and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Forensic Model on Deleted-File Verification for Securing Digital Evidence

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4038 KB) | HTML iconHTML

    The computer forensic technique that analyzes the file hidden in the computer or the file information of Windows has been widely used for the criminal check. However, these techniques had the different problems to be presented as the legal resources. The forensic viewpoint has 5 digital evidence principles such as legitimacy, identity, connectivity, speediness, integrity. This thesis is focused on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Goal-Oriented Approach for Modeling and Analyzing Attack Graph

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    As network components are often highly interdependent and interconnected,an adversary outside can take advantage of multiple vulnerabilities in unexpected ways, incrementally penetrate a network and compromise critical systems. Attack graph is commonly used for analyzing network security level for its capability in reflecting all network vulnerabilities and their inter relationships. However, atta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Method to Predict Angina Pectoris through Mining Emergency Data

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The Emergency Department (ED) has been frustrated by the problems of overcrowding, long waiting times and high costs over decades. With the development of computer techniques, various kinds of information systems have appeared and make people work more effectively, the Emergency Department Information System (EDIS) has been heralded as a "must" for the modern ED. This paper tries to build a hybrid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modified Delay Strategy for Dynamic Load Balancing in Cluster and Grid Environment

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper considers a specific Cluster and Grid computing environment, where the workstations are under full load situation. In such situations, we delay the scheduling of new jobs instead of dispatching them to one of the overloaded workstations. We present a modified delay strategy mDELAY, to significantly enhance delay-based scheduling algorithm proposed by Hui & Chanson and named as DELAY... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Discrete PSO for Data Classification

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    In this paper we have presented a new Discrete Particle Swarm Optimization approach to induce rules from the discrete data. The proposed algorithm initializes its population by taking into account the discrete nature of the data. It assigns different fixed probabilities to current, local best and the global best positions. Based on these probabilities, each member of the population updates its pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Group Key Management Protocol Using Code for Key Calculation: CKC

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    This paper presents a new group key management protocol, CKC (Code for Key Calculation). This protocol is based on logical key hierarchy. When a new member joins the group, server sends only the group key for that member. Then, current members and the new member calculate the necessary keys using node codes and one-way hash function. Node code is a code which is assigned to each node of the key tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Metric Model for Trustworthiness of Softwares

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    As people depend more and more on softwares, there has been an increasing demand for the trustworthiness of the software. To measure the trustworthiness of software, we need to design appropriate trustworthy metrics. We once proposed four metric criteria for the multi-dimensional trustworthiness of the software and a metric model which satisfies these four criteria. In this paper, we describe a ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Image Retrieval Scheme Using DCT Filter-Bank of Weighted Color Components

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4183 KB) | HTML iconHTML

    In this paper, we present a novel approach for improving retrieval accuracy based on DCT (discrete cosine transform) Filter-bank. First, we perform DCT on a given image, and generate a Filter-bank using the DCT coefficients for each color channel. In this step, DC and the limited number of AC coefficients are used. Next, a feature vector is obtained from the histogram of the quantized DC coefficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Profile Approach to Using UML Models for Rich Form Generation

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The Model Driven Development (MDD) has provided a new way of engineering today's rapidly changing requirements into the implementation. However, the development of user interface (UI) part of an application has not benefit much from MDD although today's UIs are complex software components and they play an essential role in the usability of an application. As one of the most common UI examples, con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reproducible Performance Evaluation Method for Forged Fingerprint Detection Algorithm

    Publication Year: 2010, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    As biometric technologies such as fingerprint recognition technology become more widespread, the danger posed by security attacks using forged fingerprints is increasing. To counter this threat, diverse technologies are being developed to detect fingerprint forgery. However, thus far there has no method of evaluating the performance of forged fingerprint detection algorithms that has been confirme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Improving Web Cache Server Performance Using Delayed Caching

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    As the number of Internet users increase explosively, the delay in network response time is also increasing. An economic and efficient solution for this problem is web caching. But the use of a cache server can cause another bottleneck because of the concentration of requests at the cache server. Many studies on improving cache server performance have been suggested, but existing studies have focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Risk Analysis and Assessment of Damages to Cyber Attack

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Recently, cyber attacks against the nation or the enterprise are increasing rapidly and hereupon, the necessity of standard for risk analysis and assessment of damages is raising. For surveying the actual condition of the cyber threats, it is necessary for us to grasp a danger. But actually, there are still lack of danger factors and no definite standards. As a result, we assess the amount of loss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Enhanced Security Techniques of BGP for DRDoS Attack

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an effecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Time Series Data Prediction Scheme Using Bilinear Recurrent Neural Network

    Publication Year: 2010, Page(s):1 - 7
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    A time series prediction method based on a BiLinear Recurrent Neural Network (BLRNN) is proposed in this paper. The proposed predictor is based on the BLRNN that has been proven to have robust abilities in modeling and predicting time series. The learning process is further improved by using a multiresolution-based learning algorithm for training the BLRNN so as to make it more robust for the pred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.