By Topic

2013 International Conference on Information Science and Applications (ICISA)

24-26 June 2013

Filter Results

Displaying Results 1 - 25 of 183
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1296 KB)
    Freely Available from IEEE
  • 2013 International Conference on Information Science and Applications (ICISA) [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1 - 14
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Greeting Message from the Chairs and Co-chairs

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • A Study on Visitors Tracking Method Using Wireless Communication

    Publication Year: 2013, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Wireless sensor networks are rapidly growing. Wireless sensor networks are composed of a large number of radio frequency equipped sensor devices that autonomously form networks through which sensor data is transported. These sensor devices are used in various real life applications. Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, smal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Packet Forwarding Approaches for QoS Routing in Ad Hoc Wireless Networks

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Ad hoc wireless networks were considered to be the most suitable wireless communication system in order to support various applications in mobility environments. When providing real-time applications in ad hoc wireless networks, there are some requirements: i) the design of routing algorithm with packet delivery reliability while maintaining the established route for an arbitrary length of time (i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of Interference on a Consensus Scheme for Ad-Hoc Networks

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    A consensus approach can be exploited in order to maintain a desirable performance in ad-hoc networks which require low-power consumption. We show effects of interference on the consensus scheme for ad-hoc networks in terms of BER in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergency Situation Alarm System Motion Using Tracking of People like Elderly Live Alone

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1234 KB) | HTML iconHTML

    Monitoring system for people like elderly live alone performs very important function in the event of an emergency. In this paper, we propose an implementation of real-time an emergency alarm system, which is based on the motion tracking. The proposed system in this paper is consisted of a real-time motion tracking based on vision using camera. An emergency situation can be recognized by analyzing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reaping Context-Aware Services from Living Data

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    With the number of applications multiplying, it is often felt challenging to embrace the right service. Context-aware computing can mitigate this problem by shifting the burden of decision from the user to the computing system. This new technology is expected to bring us a new life style, which is automated and more convenient. Despite much progress made in this area, context-aware services are st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model of User-Centric Context-Aware Service Development

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    The utility of a context-aware service for a user depends on the user's perception. For the user of a smart home where the set of desired services is open, it is difficult to prepare a priori for all possible service scenarios that the user considers important. This paper presents a method for developing context-aware services which empowers the user to create his/her personalized context-aware se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Modeling to Predict Security Threat of Smart Phones

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    The smart phone markets rapidly grow in the whole world as well as Korea and at the same time, security threat also tends to increase. These various studies on security threat of smart phones have been arranged but the studies on prediction models are insufficient. This paper tries to modeling to predict security threat of smart phones by using Markov Chain which is very much used in prediction st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the NFC-Based Mobile Parking Management System

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    As near field communication technologies develop rapidly and the supply ratio of smart phones gets higher, the scope to utilize NFC(Near Field Communication) is gradually increasing. It tries to propose the service to inform you parking location and traffic line with the mobile parking management system which combines these NFC technologies with IPS(Indoor Positioning System) for parking congestio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative Proposal for Data Distribution Optimization in Cloud Computing

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    Nowadays the rapid growth of the large scale application conduces a big challenge to mobile devices due to their limited computing capacities. So far, a number of research studies have been carried out, trying to help bridge this gap in the connection between thin clients and cloud networks, yet little have been found efficient. In this paper, we present an innovative proposal, taking advantage of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Local Repair Routing Algorithm Based on Link-Duration for Urban VANET

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    There are a number of challenges that need to be addressed until a wide deployment of vehicular ad hoc networks (VANETs) becomes possible. In order to support Intelligent Transportation System (ITS) service, one of those critical issues consists of the design of scalable and stable routing algorithms that are robust to frequent path disruptions caused by vehicles' mobility and buildings' shadowing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperability between Medical Devices Using near Field Communication

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    u-Health care requires interoperability between medical devices. IEEE 11073 is an internationally harmonized family of standards, produced by a grouping of manufacturers, institutions and IEEE Institute. It ensures interoperability between medical devices in u-Health environment. The Bluetooth is used for communication. We focus on new and innovative NFC based Bluetooth pairing in u-Health environ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability of Information Disclosure in Data Transfer Section for Safe Smartwork Infrastructure

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Recently, by taking the latest portable IT devices, interest are growing for the 'Smart work' to conduct business in real time without the constraints of time and places. The companies taking Smart Work as a enviroment has become a necessity rather than choice. In reality because user of smart phone is growing exponentially, using personal device are getting lots of people to do their tasks. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Channel-Aware Path Selection Scheme for Mobile WiMAX Networks

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Relay is one of major features considered for IMT-Advanced systems. The main function of relay station is to enhance the network capacity and extend the coverage area. The paper focuses on multi-hop routing mechanism used in relay WiMAX networks. The performance of routing path selection is based on the throughput and packet loss ratio for the downlink transmission. This paper proposes channel-awa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Stable Route Decision Scheme in Urban Inter-Vehicle Communication

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    Vehicular ad-hoc network (VANET) is constructed of networks using direct radio communication among moving vehicles without fixed infrastructure. Network topologies change frequently due to high mobility and communication disconnections particularly occur due to interruptions of message propagation caused by obstacles such as buildings in urban traffic environment. Therefore, a VANET routing protoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Step Detection Algorithm for Wireless Smart Step Counter

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    we had designed and implemented a smart step counter with adaptive step detection algorithm that can enhance the accuracy of step detection using step amplitude. This algorithm can pick step count out over 99% of accuracy through the adaptive step detection algorithm. To prove the effectiveness of the new algorithm, we made a noise filtering process with the amplitude threshold from the amplitude ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast JPEG Color Space Conversion on Shared Memory

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    With the increasing popularity of multimedia devices and applications, JPEG (Joint Photographic Experts Group) images have been being used in almost all kinds of digital devices. In JPEG compression, color space conversion has become a very important role in the image acquisition, display and the transmission of the color information. This paper experiments the performance of JPEG color space conv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-Based Human-Vehicle Interface for Ubiquitous Telematics

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    In the ubiquitous computing environment, a ubiquitous vehicle will be a communication node in the vehicular network as well as the means of ground transportation. It will make humans and vehicles seamlessly and remotely connected. Especially, one of the prominent services in the ubiquitous vehicle is the vehicle teleoperation. However, mutual-collaboration with the in-vehicle communication network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Remote Control Architecture for Thin-Client in Mobile Cloud Computing

    Publication Year: 2013, Page(s):1 - 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Smart mobile devices such as smartphone, and smart pad have rapidly pervaded our everyday life. If the limitation of their relatively poor computing resources such as processor, memory, battery can be expanded, smart mobile devices will become more powerful tool for human life. Mobile cloud computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.