By Topic

2014 International Conference on IT Convergence and Security (ICITCS)

28-30 Oct. 2014

Filter Results

Displaying Results 1 - 25 of 129
  • [Title page]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2014, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Welcome Message

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2014, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • List of authors

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • A Case Study of Visual Analytic Method on Behavior Modification by Movement Therapy

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    A little cause of childhood disorder influences the whole processes of human development, and the objective and quantitative analysis and evaluation method on development of childhood is required. We developed a new image development analysis by introducing image processing technology as well as conventional developmental evaluation. In this research, classes will be conducted using movement thera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Code Based Fruit Recognition Method Via Image Convertion Using Multiple Features

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    This research is to propose a fast and accurate object recognition method especially for fruit recognition to be used for mobile environment. Conventional techniques are based on one or more of basic features that characterize an object: color, shape, texture and intensity, causing performance limitation for mobile environment. Thus, this paper presents a combined approach that transforms those ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Community Divisive Algorithm Using Local Weak Links

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Detecting community structure can give a significant insight into structural and functional properties in complex networks. In this paper, we map nodes into random variables and use correlation coefficient to evaluate similarity between nodes. After defining the local weak links and analyzing the properties of correlation coefficient, we propose a divisive algorithm to uncover reasonable communiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Transfer Station Location Model in Relay Delivery Considering Carbon Footprint

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Due to climate warming, governments around the world is developing a serial of measures to reduce greenhouse gas emissions. On the basis of the transfer station location model of relay delivery, this paper takes carbon footprint into account of the location model. Respectively, strict carbon caps, carbon cap and trade, carbon tax and combination of carbon cap and trade with the carbon tax, the fou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GPS Information Sharing System Based on Bluetooth Technology

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    The traditional GPS positioning technology is susceptible to buildings which incur severe signal attenuation and therefore the current actual GPS location information could not be directly obtained for a mobile device in some cases. The Bluetooth technology has attracted widespread attention recently due to its low-cost and strong anti- interference features. In this paper, we combined the Bluetoo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Height-Map Based Terrain Rendering with Tessellation Hardware

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2792 KB) | HTML iconHTML

    The height-map is one of the most representative ways of 3D terrain rendering. Technically, the management of level-of-detail factors is the core of height-map rendering. We have a bundle of GPU-based level-of- detail management schemes for terrain renderings, in addition to the lots of CPU-based ones. From OpenGL 4.0 and DirectX 11, the hardware tessellation features are provided to dynamically c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Magnetic Resonant Coupling Wireless Power Transmission System under Different Load Conditions

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (998 KB) | HTML iconHTML

    Since the magnetic resonant coupling was suggested for wireless power transfer (WPT), the theoretical analysis and experimental verification of resonant coupling structures have been investigated. However, the relationship between the performance characteristics and the load conditions has not been fully explored yet. In this research, a magnetic resonant coupling wireless power transmission syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Core Architectural Pattern Selection Method for the Transition from Single-Core to Multi-Core Architecture

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1206 KB) | HTML iconHTML

    Along with rapid advancements of convergent devices, increased software complexity paired with contrastingly shortened software product lifecycle have introduced new challenges from which the need to transform legacy single-core based systems to multi-core systems have emerged. Unfortunately, existing software development processes are late in providing adequate support for multi-core parallelizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Prefetch Technique for High Performance Embedded System

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Improving the performance of embedded systems can be supported by increasing the hit rates of last level caches (LLC). To enhance the hit rates of LLC, we propose a new prefetch technique. The proposed prefetch technique can fetch the data from main memory prior to actual requests to reduce the long latency to the main memory. To support the proposed technique, we introduce a new structure, LLC bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Preference-Based Multi-Objective Evolutionary Algorithm for Redundancy Allocation Problem

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB) | HTML iconHTML

    Allowing the decision maker (DM) incorporates his/her preferences in Multiobjective Evolutionary Algorithm (MOEA) is likely yield better approximation of optimal trade-off solutions for multi-objective optimization problem (MOP). In this paper, we propose a preference-based MOEA to help the DM choosing the final best solution(s) based on his/her preferred objective(s). Our algorithm is called ASA-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Expatriate Cross- Cultural Adjustment and Job Performance in MNCs

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    This study explores the extents to which expatriates adjust and perform in a new environment in multinational corporations (MNCs). The main idea is to find out the challenges that expatriate face during adjustment stage which influences both positively and negatively on expatriate job performance in MNCs. Hence, for achieving appointed goals, we present a five-stage process model. Than we make som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A SIFT-Color Moments Descriptor for Object Recognition

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    Feature extraction technique has been widely studied and used in many fields, such as Augmented Reality, 3D Reconstruction and object recognition. In recent years, intensity-based descriptor have been widely used for feature extraction, and the SIFT descriptor is the most robust of them. However the color information is not included in SIFT, and the color provides important information in object d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of High Efficiency Video Coding File Format

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    This paper describes the file format of High Efficiency Video Coding (HEVC), the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The HEVC standard targets at a wide range of video applications, including high-bitrate entertainment, Internet streaming as well as video conferencing. Mainly, this standard focuses on achieving the sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Audio Levels and Loudness Standard for Digital Broadcasting Program

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Recently, in digital broadcasting, audio loudness control has emerged as an important issue. Therefore, several standardizations for audio loudness have been legislated by ITU, ATSC, and EBU; further some countries have started to put regulation on television programs to prevent discomfort in loudness. In this paper, we examine the international standards on broadcast loudness standard and their d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Implementation of IVI Applications for Connected Vehicle Using HTML5

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Applications and networking are the key functions for connected vehicle. And applications of In-Vehicle Infotainment (IVI) system are one of the important characteristics in the automotive industry. Because of the fast evolution of electronic technologies, automotive industry cannot adopt new technology easily. IVI platform standard was developed by automotive OEM and suppliers but the problems st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Privacy Protection Tasks for Cross-Border Data Transfers

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    This study suggests implement issues for safe distribution in the viewpoints of governments, businesses and people as stakeholders according to transborder flows of personal information in managerial aspects and institutional aspects. This study is to choose the best policy for international cooperation system against cybercrime focused on the information management and information communication t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulations of continental logistics center from the perspective of technologist

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Planning of infrastructure and processes in logistic center within the frame of various kinds of logistic hubs and technological activities in them represent quite complex problem. The main goal is to design appropriate layout, which enables to realize expected operation on the desired levels. The simulation software represents progressive contemporary experimental technique, which can support com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Secure Element for Smartwork

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In recent years, computing environment has changed a lot by rapid development of computing technology and adoption of cloud computing is increasing. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastruc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Redundancy Approach in Watermarking Using Sudoku

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    Digital watermarking is one of the most important techniques employed to protect digital contents. Copyright information embedded in the digital contents may become undetectable due to compression and additive noise attacks introduced into a watermarked image. A general strategy to overcome such attacks is to embed redundant watermarking to improve the survivability of the watermark. However, curr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.