By Topic

2013 International Conference on IT Convergence and Security (ICITCS)

16-18 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 140
  • [Front cover]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 2013 International Conference on IT Convergence and Security (ICITCS) [Copyright notice]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • ICITCS 2013 Welcome Message

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • ICITCS 2013 Organizing Committee

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • ICITCS 2013 Reviewers

    Publication Year: 2013, Page(s):i - vi
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • ICITCS 2013 List of Papers

    Publication Year: 2013, Page(s):i - viii
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • ICITCS 2013 List of Authors

    Publication Year: 2013, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • A Bergman Ring Based Cryptosystem Analogue of RSA

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    Based on results of J.J.Climent, Pedro R. Navarro and Leandro Tortosa about Bergman ring, the paper constructs an exponent type encryption and decryption cryptosystem analogue of RSA. Althought involving many operations than original RSA in encryption and decryption processes, the cryptosystem has some advantages compare to known RSA variants. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study of Wellness IT: Therapeutic Horseback Riding

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Recently, there has been an increasing interest and demand for an effective use of leisure time. Many Koreans especially enjoy horseback riding as one way of spending leisure time. Some scholars noticed psychological, social, and emotional benefits produced by horseback riding because it is connected with various aspects of human movement and a special connection with an animal. Therefore, this st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Celestial Map Renderer Based on 3D Graphics System

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1803 KB) | HTML iconHTML

    It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Energy Monitoring and Management System for Educational Institutions

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Excessive utilization of Heating, Ventilation and Air Conditioning (HVAC), and Information and Communication Technology (ICT) equipment in Higher Education Institutes (HEI) in addition to variation in occupancy patterns are the main reasons behind the ever increasing level of energy consumption in such environments. Reducing energy consumption while maintaining the comfort level of students and st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Group Based In-Block Logging for Flash Based Systems

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    This paper presents a novel B-tree storage scheme that reduces the number of time-consuming erase operations on flash memory-based systems. The scheme adopts group-based round robin fashion and in-block logging technique for efficiently maintaining the B- tree nodes in the heavy-update workloads. Experimental results show that the proposed scheme improves the I/O performance by up to 3X , compared... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Bag-of-Words Model Based on Local Space-Time Features for Human Action Recognition

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    This paper presents an improved hierarchical bag-of-words model based on local space-time features to generate multi-level features, in which higher-level features are generated by lower-level feature neighborhoods. An improved method is developed to extract low-level local space-time features, in which the concept of video orthogonal planes is introduced, and interest points are detected on video... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In cooperative Mobile Ad-hoc Networks (MANETs), copies of data are replicated on different mobile devices to increase resource accessibility and data availability. In order to preserve data consistency, a leader or authoritative control node is assigned to act as an organizer for the shared data copies. Since mobile devices have limited battery power, the leader may fail at any time. When the lead... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    This paper proposes the scheme to detect the Mobile AP from mobile devices independently without the help of additional nodes. The proposed scheme is for detecting the Mobile AP that does not have any security configuration which is highly likely to occur as the Rogue AP in real wireless network environment. The device inspects the NAT Behavior and Open Port at the time of specific AP connection t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network-Based Internet Worm Intrusion Detection and Prevention System

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Key Exchange Protocol on Thompson Groups

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Security Model for Robust Web Services

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Attack techniques has been intelligent more and more with the development of computing technology. The damage by that is greatly increased. Therefore, the collection of information about diversifying attack has been properly achieved in order to actively respond to these attacks. Coping with attacks in advance and detection is not easy because especially DoS attacks are various. In this study, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P Network Booting Scheme Using a BitTorrent-Like Protocol

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Network booting is widely used today, mostly for thin-client computing, cluster computing, and operating system installation. Popular protocols like trivial file transfer protocol (TFTP) and hypertext transfer protocol (HTTP) are used to download operating system images. Network booting clients simultaneously downloading from a single server create a bottleneck at the server's link once the link c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Real-Time Fire Detection and Notification System Based on Computer Vision

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Fires are one of the main causes of death amongst the world. Although there are various fire detection systems most of them did not proof its effectiveness in detecting fires due to inefficiency or restrictions. For example, systems based on smoke sensors in detecting fires cannot be used in open areas because they are restricted to the existence of a ceiling or a wall. Besides that, having many f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Study of Webpage Text Classification Algorithms for Arabic and English Languages

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Webpage text Classification is an important problem that has been studied through different approaches and algorithms. It aims to assign a predefined category to a Webpage based on its content and linguistic features. It has many applications such as word sense disambiguation, document indexing, text filtering, Webpages hierarchical categorization and document organization. This study is a part of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Space Effective DRAM Adapter for PRAM-Based Main Memory System

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Wellness Core Technology and E-Sports

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1084 KB) | HTML iconHTML

    This research analyzed the current status concerning pro games in order to identify the level of vitalization for the e-sports in Korea with the goal of increasing qualitative growth. Along with current status analysis, this research examined socio-cultural significance of e-sports. As such, the purpose of this research is to provide implications so that the e-sports can be established properly an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.