By Topic

Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on

Date 13-15 April 2011

Filter Results

Displaying Results 1 - 25 of 39
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1598 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (127 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (95 KB)  
    Freely Available from IEEE
  • Message from Program Chairs

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB)  
    Freely Available from IEEE
  • Committee Organization

    Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (95 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey

    Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks. Extensive research has been done in comparing the different proposed ad-hoc routing protocols under varying network scenarios. Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons. In this survey paper we had analyzed the performance of the routing algorithms under various networks conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clubbing of e-Commerce and Social Networking Sites

    Page(s): 8 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (164 KB) |  | HTML iconHTML  

    There has been an enormous increase of the usability of the Social Network websites. Similarly the online purchase has amplified many folds. This paper deals with the proposal of integrating the effectiveness of Social websites along with the e-commerce portals. By this way, the social network site and e-commerce site provide a collective platform for promotion of the items and the e-commerce portal can take advantage of the existing usability features of the social networking websites. Also content related advertisements can be placed in the sites and can invoke interests among the website users. The marketing strategies may include the whiz list, informing the buyer's friends list about the purchased item of the buyer and much more. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Privacy Scheme for Providing Anonymity Technique on Sensor Network

    Page(s): 10 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB) |  | HTML iconHTML  

    Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment

    Page(s): 15 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag

    Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location Based Service Using 2.45GHz Active Tag

    Page(s): 25 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization for Security System of Facility Management Based USN

    Page(s): 30 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    Regardless of the technical significance held by USN, the un-manned surveillance using wireless network cameras, the sensing technologies using the trespassing surveillance sensors as well as the technologies of encoding the data occurring within such systems, the technologies of transferring and processing them through the sensor network and the efficient person positioning and placement method using RFID have become a single integrated system in the industrial field for the security of facilities and have not yet been provided as services. The present paper proposes the user tracking and management systems using RFID, sensor and microwave intrusion detecting to replace the composition of network cameras and the existing infrared intrusion detecting sensors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Abnormal Masses in Digital Mammography Images

    Page(s): 35 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (478 KB) |  | HTML iconHTML  

    Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common said abnormalities that may indicate breast cancer are masses and calcifications. The challenge is to early and accurately detect to overcome the development of breast cancer, which affects more and more women throughout the world. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. Digital mammogram is one of the best technologies currently being used for diagnosing breast cancer. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram image. In the paper a method have been develop to make a supporting tool to easy and less time consuming of identification of abnormal masses in digital mammography images. The identification technique is divided into two distinct parts i.e. Formation of Homogeneous Blocks and Color Quantization after preprocessing. The type of masses, orientation of masses, shape and distribution of masses, size of masses, position of masses, density of masses, symmetry between two pair etc are clearly sited after proposed method is executed on raw mammogram for easy and early detection abnormality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SteganPEG Steganography + JPEG

    Page(s): 42 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (714 KB) |  | HTML iconHTML  

    To days internet world is full of data thieves and hackers. So, there is a need to design a system that enables the internet users to exchange their secret and private data safely across the web. Steganograhy is such a tool. It hides the user data in other kinds of data, so that no one can suspect that some sensitive data is being transferred.. Stegan PEG is an application of image steganography. It hides files in a JPEG image. This paper describes the methods used by the application in achieving its goal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Signature Authentication Scheme

    Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (182 KB) |  | HTML iconHTML  

    In this paper we propose a new Handwritten Signature Authentication Scheme. The scheme consists of two main Rule Set Algorithms and one Authentication Algorithm. The Algorithms are based on extensive statistical analysis, Mean Variance and Theory of Estimation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Based Public Key Method for Steganography

    Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. The original steganographic applications used "null ciphers", or clear text. A null cipher conveys that the message has not been encrypted in any way, whether it is using basic character shifting, substitution or advanced modern day encryption algorithm. So, the message is often in plain view but for a reason can either not be detected as being present or cannot be seen once detected. As is common with cryptography, steganography has its roots in military and government applications and has advanced in ingenuity and complexity. In this paper, Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Information Centre for Location Prediction and Effective Handoff

    Page(s): 57 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (145 KB) |  | HTML iconHTML  

    Processing handoff is a significant issue in wireless communication system. When a mobile node (MN) moves from its current Access Point (AP) to another, a new connection with a new Access Point has to be established and the old connection has to be released. The handoff decision is done by Access Point, by measuring the signal Quality. In this paper, selection of a new Access Point and the prediction of the location of Mobile Node based on distance is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Information Centre -- An Approach to Fast Handoff

    Page(s): 60 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    In 802.11 based wireless networks, the mobile nodes (MN) are associated with the available Access Points (APs) and communicate through them. In conventional handoff schemes, the mobile nodes receives the information regarding active APs in their neighbourhood by scanning the available channels and listen to transmitted beacons. In this paper a new handoff agent, specifically designed to reduce authentication delay during handoff, is introduced to enhance handoff speed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implement of Integrated Solution for Zoos Using RFID/USN Based LBS Technology

    Page(s): 63 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (497 KB) |  | HTML iconHTML  

    In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Buffer Management Algorithm in Wireless Sensor Networks with Mobile Collectors

    Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    In wireless Sensor Networks(WSNs), the energy for the sensor nodes that are close to the base station will be quickly depleted due to their high data transmission activities. To address the problem, the concept of Mobile Collectors(MC) is introduced, but in spite of it, local buffer management algorithm is needed, which is our main concern in this paper. At first, each sensor only transmits its gathered data with a MC. If a raw data shows regularity two consecutive periods according to criterion(theta) , the value will be stored in a different form. To do so, local buffer is divided into two parts : Correct Data(CD) and Differential Data(DD). In this way, the data needs less storage without the loss of data accuracy. We have implemented a simulator to evaluate the efficiency of the proposed algorithm. From the results, we come to know our algorithm is fairly efficient compared with the normal form. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.