26-29 April 2011
Filter Results
-
[Title page]
Publication Year: 2011, Page(s): i|
PDF (155 KB)
-
[Copyright notice]
Publication Year: 2011, Page(s): i|
PDF (96 KB)
-
Greeting Message from the General Chair
Publication Year: 2011, Page(s): i|
PDF (129 KB)
-
Greeting Message from the General Co-Chair
Publication Year: 2011, Page(s): i|
PDF (131 KB)
-
Organizing Committee
Publication Year: 2011, Page(s):i - ii|
PDF (102 KB)
-
Program Committee
Publication Year: 2011, Page(s):i - iii|
PDF (77 KB)
-
2DPCA for Vehicle Detection from CCTV Captured Image
Publication Year: 2011, Page(s):1 - 5
Cited by: Papers (1)This paper has proposed an application of 2D principal component analysis (2DPCA) and genetic algorithm (GA) for vehicle detection from CCTV captured image. The system deploys a 2DPCA algorithm for feature extraction of vehicle within gray scale images. These vehicle feature matrices of size 50×20 are trained and then classified by using genetic algorithm. This system can detect different vehicle ... View full abstract»
-
A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service
Publication Year: 2011, Page(s):1 - 7
Cited by: Papers (10) | Patents (1)Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must have a viable way to protect their clients' data, especi... View full abstract»
-
A Computational Agent-Based Modeling Approach for Competitive Wireless Service Market
Publication Year: 2011, Page(s):1 - 6
Cited by: Papers (2)Using an agent-based modeling method, we study market dynamism with regard to wireless cellular services that are in competition for a greater market share and profit. In the proposed model, service providers and consumers are described as agents who interact with each other and actively participate in an economically well-defined marketplace. Parameters of the model are optimized using the Levenb... View full abstract»
-
A Context-Awareness for Mechanical Maintenance
Publication Year: 2011, Page(s):1 - 5Ongoing development of information technology provides a fundamental environment of maintaining vast manual information in digital form. Demand of digital information increases because of easy handling and presentation of documents on various structure manner. As a result, technical documents like mechanical device maintenance manuals have numerous advantages to move from page version into electro... View full abstract»
-
A Fast and Effective Domain-Specific Design Method with a Top-Down Scheme
Publication Year: 2011, Page(s):1 - 6Domain specific design of reconfigurable architecture is a hard and time-consuming job. In this paper, a fast and effective domain-specific design method is proposed which mainly concludes a top-down subgraph enumeration algorithm and a heuristic identification process based on topological searching. A clustering and splitting algorithm is used to enumerate all the maximal valid subgraphs (MVSs) o... View full abstract»
-
A Fault Tolerant Channel Allocation Scheme for Mobile Hosts in GMPLS-Based Wavelength-Switched Optical Networks
Publication Year: 2011, Page(s):1 - 7
Cited by: Papers (1)The mobile networks must have an ability to maintain an acceptable level of service during network failures to provide high resilience against service failures. This paper presents an eccentric fault tolerant path grouping scheme that can achieve mobility independent Quality of Service (QoS) guaranteed services in Generalized Multiprotocol Label Switching (GMPLS) based wavelength-switched optical ... View full abstract»
-
A Genetic Algorithm for the Routing Protocol Design of Wireless Mesh Networks
Publication Year: 2011, Page(s):1 - 6
Cited by: Papers (3)Wireless Mesh Network technology refers to technology that establishes a wireless network whose transmission speed is similar to that of a wired system. It provides enhanced flexibility in the building of the network, compared to the existing wired network. In addition, it has lower mobility and less restriction from the energy effect. However, there are many considerations, such as system overhea... View full abstract»
-
A Lightweight Protocol Based on the SSL Protocol for Handheld Devices
Publication Year: 2011, Page(s):1 - 4Currently the most popular secure protocol is SSL (Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI (Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL proto... View full abstract»
-
A Methodology for Accurate and Redundancy-Free Business Requirements Description Using Ontology
Publication Year: 2011, Page(s):1 - 7Data deluge and changing business environment are considered to be serious in that data in corporate information systems are too conveniently and frequently replicated for companies to make decisions properly. Inaccurate and redundant data would induce erroneous decision making which bases on error-infectious information systems. We report that most of inaccuracy and redundancy can be effectively ... View full abstract»
-
A Model Driven Framework to Compose Heterogeneous Services
Publication Year: 2011, Page(s):1 - 10
Cited by: Papers (1) | Patents (1)In order to better comply to new requirements or quick adjustment with changing requirements, service composition is used in the way of exploiting the capability of available services. Service composition is one of the most benefits of SOA. Since emerging of RESTful web services, the needs for heterogeneous composition have been raised and brought up new challenges. On the other hand, service comp... View full abstract»
-
A New Cluster Based Protocol for Wireless Sensor Networks
Publication Year: 2011, Page(s):1 - 8A new scheme that serves to find a routing path for Wireless Sensor Networks (WSNs), with a view to facilitate an increase in the network life time is proposed in this paper. It envisages the network to be in the form of clusters and develops an algorithm for transfer of information within the nodes and to the remote Base Station (BS). The approach involves the use of Ad-hoc On Demand Distance Vec... View full abstract»
-
A Reliable Multicast MAC Protocol Using Busy-Tone for the IEEE 802.11-Based Wireless Networks
Publication Year: 2011, Page(s):1 - 7Various application services including multimedia applications need efficient multicast technologies, but the IEEE 802.11 protocol, which is currently the most widely used, does not specify the standard on multicast, which is, instead, substituted by broadcast or a combination of unicast. Using broadcast is, however, difficult to judge on the transmission success or fail, because it does not recei... View full abstract»
-
A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model
Publication Year: 2011, Page(s):1 - 4
Cited by: Patents (1)The development of Information and Communication gives a lot of convenience in our lives, but on the other hand, the new cyber threat like viruses, computer intrusions and so on also increases. Especially, malicious codes such as viruses over the internet are distributed in large quantities. Several studies using reverse engineering or virtual machine have been carried out to analyze malicious cod... View full abstract»
-
A Study on Implementation of Interactive Web 3D Virtual Environment Using O3D
Publication Year: 2011, Page(s):1 - 4
Cited by: Papers (1)This paper proposes an interactive Web 3D virtual experience environment based on O3D. A virtual experience hall was implemented with an educational goal of "saving the earth from global warming." The interactive Web 3D virtual experience hall is capable of providing flexible services without being confined to a specific platform. A storytelling approach was employed to maximize the interactive ex... View full abstract»
-
A Study on Improvement of the Evidence Collection Module in Windows Forensic
Publication Year: 2011, Page(s):1 - 4Recently, A malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection modules do not provide evidences conveniently or sometimes cannot provide... View full abstract»
-
A Study on Information Security Level Evaluation Using Fuzzy AHP
Publication Year: 2011, Page(s):1 - 6
Cited by: Papers (1)Today information itself has become main sources of every social activity and economic life and the abilities of collection, analysis, literacy of information has also become important properties that control national interests or competitive power of a nation. Therefore, to erect and propel information security policies is essential and to do this, there should be maturity, progress of informatio... View full abstract»
-
A Study on Jamming Vulnerability of Aeronautical Communication System Using Android Phone
Publication Year: 2011, Page(s):1 - 5
Cited by: Papers (1)Recently, As a android phone offers more superior functions and interface than an existing traditional phone, the number of user has been increased rapidly. But, the number of vulnerable android phone in security has been rising due to customizing the system of android phone for the convenience of user, there are many cases of customizing the system. Simultaneously a number of android phones which... View full abstract»
-
A Study on Machine Learning Algorithms for Fall Detection and Movement Classification
Publication Year: 2011, Page(s):1 - 8
Cited by: Papers (9)Falls among the elderly is an important health issue. Fall detection and movement tracking are therefore instrumental in addressing this issue. This paper responds to the challenge of classifying different movements as a part of a system designed to fulfill the need for a wearable device to collect data for fall and near-fall analysis. Four different fall trajectories (forward, backward, left and ... View full abstract»
-
A Study on Malicious Codes Pattern Analysis Using Visualization
Publication Year: 2011, Page(s):1 - 5The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visual... View full abstract»