By Topic

Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on

Date 13-15 April 2011

Filter Results

Displaying Results 1 - 25 of 39
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1598 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2011, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Organization

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey

    Publication Year: 2011, Page(s):3 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clubbing of e-Commerce and Social Networking Sites

    Publication Year: 2011, Page(s):8 - 9
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    There has been an enormous increase of the usability of the Social Network websites. Similarly the online purchase has amplified many folds. This paper deals with the proposal of integrating the effectiveness of Social websites along with the e-commerce portals. By this way, the social network site and e-commerce site provide a collective platform for promotion of the items and the e-commerce port... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Privacy Scheme for Providing Anonymity Technique on Sensor Network

    Publication Year: 2011, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment

    Publication Year: 2011, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag

    Publication Year: 2011, Page(s):20 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location Based Service Using 2.45GHz Active Tag

    Publication Year: 2011, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization for Security System of Facility Management Based USN

    Publication Year: 2011, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Regardless of the technical significance held by USN, the un-manned surveillance using wireless network cameras, the sensing technologies using the trespassing surveillance sensors as well as the technologies of encoding the data occurring within such systems, the technologies of transferring and processing them through the sensor network and the efficient person positioning and placement method u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Abnormal Masses in Digital Mammography Images

    Publication Year: 2011, Page(s):35 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common said abnormalities that may indicate breast cancer are masses and calcifications. The challenge is to early and accurately detect to overcome the development of breast cancer, which affects more and more women throughout the world. Masses appear in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SteganPEG Steganography + JPEG

    Publication Year: 2011, Page(s):42 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    To days internet world is full of data thieves and hackers. So, there is a need to design a system that enables the internet users to exchange their secret and private data safely across the web. Steganograhy is such a tool. It hides the user data in other kinds of data, so that no one can suspect that some sensitive data is being transferred.. Stegan PEG is an application of image steganography. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Signature Authentication Scheme

    Publication Year: 2011, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    In this paper we propose a new Handwritten Signature Authentication Scheme. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Based Public Key Method for Steganography

    Publication Year: 2011, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be appare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Information Centre for Location Prediction and Effective Handoff

    Publication Year: 2011, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Processing handoff is a significant issue in wireless communication system. When a mobile node (MN) moves from its current Access Point (AP) to another, a new connection with a new Access Point has to be established and the old connection has to be released. The handoff decision is done by Access Point, by measuring the signal Quality. In this paper, selection of a new Access Point and the predict... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Information Centre -- An Approach to Fast Handoff

    Publication Year: 2011, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    In 802.11 based wireless networks, the mobile nodes (MN) are associated with the available Access Points (APs) and communicate through them. In conventional handoff schemes, the mobile nodes receives the information regarding active APs in their neighbourhood by scanning the available channels and listen to transmitted beacons. In this paper a new handoff agent, specifically designed to reduce aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implement of Integrated Solution for Zoos Using RFID/USN Based LBS Technology

    Publication Year: 2011, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Buffer Management Algorithm in Wireless Sensor Networks with Mobile Collectors

    Publication Year: 2011, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In wireless Sensor Networks(WSNs), the energy for the sensor nodes that are close to the base station will be quickly depleted due to their high data transmission activities. To address the problem, the concept of Mobile Collectors(MC) is introduced, but in spite of it, local buffer management algorithm is needed, which is our main concern in this paper. At first, each sensor only transmits its ga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.