International Conference on Convergence and Hybrid Information Technology 2008 ICHIT Table of Contents

Size: px
Start display at page:

Download "International Conference on Convergence and Hybrid Information Technology 2008 ICHIT Table of Contents"

Transcription

1 International Conference on Convergence and Hybrid Information Technology 2008 ICHIT 2008 Table of Contents Message from the General Chairs...xv Message from the Program Chairs...xvi Conference Organizers...xvii Program Committee...xviii Conference Papers A Case Study on Programming Intelligent Swarm Robots Using Pyro Environment and Player/Stage Simulator...3 Byung-Jun Lee, Jeong-Hoon Ji, and Gyun Woo A Collaborative Access Control Based on XACML in Pervasive Environments...7 Kyu Il Kim, Hyuk Jin Ko, Won Gil Choi, Eun Ju Lee, and Ung Mo Kim A Comparative Visualization System for the Proximity of Genes on Whole Genome Scale...14 Chi-Young Cho, DoHoon Lee, and Hwan-Gue Cho A Conceptual Schema Based XML Schema with Integrity Constraints Checking...19 Oviliani Yenty Yuliana and Suphamit Chittayasothorn A Convergence Criteria Model of Client-Side Application-Layer Convergence Towards Fixed-Mobile Convergence...25 Toshihiko Yamakami A Design of Home Network Security Protocol Using User Authentication and Access Control Technology...30 Young Gu Lee, Hyun Chul Kim, Jung Jae Kim, and Moon Seog Jun A High Connectivity Pre-Distribution Key Management Scheme in Grid-Based Wireless Sensor Networks...35 Nguyen Xuan Quy, Vishnu Kumar, Yunjung Park, Eunmi Choi, and Dugki Min v

2 A Knowledge-Evolution Strategy Based on Genetic Programming...43 Chan-Sheng Kuo, Tzung-Pei Hong, and Chuen-Lung Chen A Low-Latency L2 Handoff between WiBro and cdma2000 Mobile Networks...49 Choongyong Shin, Seokhoon Kim, and Jinsung Cho A New Similarity Measure Based on Weibull Distribution for Detecting Plagiarized Source Codes...56 Jeong-Hoon Ji, Gyun Woo, and Hwan-Gue Cho A Novel Method for Filtering Group Sending Short Message Spam...60 Peizhou He, Xiangming Wen, and Wei Zheng A Performance Evaluation of Vertical Hanover Architecture with Low Latency Handover...66 Do-Hyung Kim, Won-Tae Kim, Hwan-Gu Lee, Sun-Ja Kim, and Cheol-Hoon Lee A Proposal of Building an Early-Stage Diagnosis System of First-Aid through Wireless Internet...70 Randy S. Tolentino, Jung-Hwan Hwang, Sun-Ho Kim, Yong-Tae Kim, Gil-Cheol Park, and Dae-Joon Hwang A Prospective Algorithm for Real Plane Identification from 3D Point Clouds and 2D Edges...75 Jae-Kyu Lee, Seongjin Ahn, and Jin Wook Chung A Reconfiguration Framework for Self-Healing Software...83 Jeongmin Park, Giljong Yoo, and Eunseok Lee A Reputation Management Scheme Improving the Trustworthiness of P2P Networks...92 Junghwa Shin, Taehoon Kim, and Sungwoo Tak A Research of Enhanced Web-Based USIM System Using by ActiveX...98 Cheul-Jun Hwang, Se-Woon Oh, and Min-Soo Jung A Reuse-Based Software Development Method Yoonsun Lim, Myung Kim, Seungnam Jeong, and Anmo Jeong A RFID Transmission System with a Security Agent Heung-Kuk Jo and Hoon-Jae Lee A Safe AODV (Ad Hoc On-Demand Distance Vector) Security Routing Protocol Jin Taek Kim, Jeong-Ho Kho, Chang-Young Lee, Do-Won Lee, Cheol-Soo Bang, and Geuk Lee A Smart Communication System for Avatar Agents in Virtual Environment Soo-Hyun Park, Seung-Hyun Ji, Dong-Sung Ryu, and Hwan-Gue Cho A Structured Template for an Effcient Dependable System Design Using Model Driven Architecture and Spin Tool Vishnu Kumar Kaliappan, Prabhu Shankar Kaliappan, Nguyen Xuan Quy, Duckwon, Dugki Min, and Eunmi Choi vi

3 A Study on Prediction Models for Massive Data Processing RongHua Du and AiPing Li A Study on Secure Contents Transmission in Home Domain Young-Gu Lee, Chang Bo Lee, Jung Jae Kim, and Moon Seog Jun A Study on the Ubiquitous Wellbeing System Design and Implementation Using Wireless Bio-Signal Sensor Yang-Jae Park, Nam -Il Kim, Un-Gu Kang, and Sung-Kwan Kang A Stylized Binarization Procedure for Black/White Comics Using HSV Region Extension Dong-Sung Ryu and Hwan-Gue Cho A User Modeling Using Implicit Feedback for Effective Recommender System Jehwan Oh, Seunghwa Lee, and Eunseok Lee A Value Estimation Method for Feature-Oriented Requirements Tracing Sangim Ahn and Kiwon Chong Alert Fusion Based on Cluster and Correlation Analysis Shisong Xiao, Yugang Zhang, Xuejiao Liu, and Jingju Gao An Abandoned Objects Management System Based on the Gaussian Mixture Model Chih-Yang Lin and Wen-Hao Wang An Effective License-Plate Detection Method for Overexposure and Complex Vehicle Images Hsiao-Yun Tseng, Ching-Hao Lai, and Shyr-Shen Yu An Effective XML Data Release in Dynamic Environments Hyuk Jin Ko, Kyu Il Kim, Eun Ju Lee, Won Gil Choi, and Ung Mo Kim An Intelligent NPC Framework for Context Awareness in MMORPG Bong-Keun Lee, Choong-Shik Park, Jae-Hong Kim, Sang-Jo Youk, and Keun Ho Ryu Analysis of a Trust and Reputation Model Applied to a Computational Grid Using Software Agents Robson de Oliveira Albuquerque, Fernanda Fontes Cohen, Jovelina Lima Teixeira Mota, and Rafael Timóteo de Sousa Júnior Automated Digital Photo Classification by Tessellated Unit Block Alignment Chuljin Jang and Hwan-Gue Cho Automatic Face Detection Using Feature Tracker Ki-sang Kim, Gye-Young Kim, and Hyung-Il Choi Based on Expand RBAC Grid Collaborative Design System Access Control Model Xuebin Chen, Guolin Duan, and Jin Cai Character Animation Tool Biped Hand Selector Hikmat Abdoollayev, Eunmi Choi, and Dugki Min vii

4 Color Based Hand and Finger Detection Technology for User Interaction Sung Kwan Kang, Mi Young Nam, and Phill Kyu Rhee Conceptual Modeling of Enterprise Application System Using Social Networking and Web 2.0 Social CRM System Subaji Mohan, Eunmi Choi, and Dugki Min Content-Based Intelligent Routing and Message Processing in Enterprise Service Bus Gulnoza Ziyaeva, Eunmi Choi, and Dugki Min CORAS for the Research of ISAC Ya-Ping Fu, Kwo-Jean Farn, and Chung-Huang Yang Cryptanalysis and Improvement on a Remote User Authentication Scheme Using Bilinear Pairings Lijiang Zhang and Puwen Wei Data Hiding in Binary Images by Pixel-Value Weighting Ki-Hyun Jung, Keum-Sook Ha, and Kee-Young Yoo Design and Implementation of Mobile Cobrowsing Service which Supports the Sharing of Web Page Among Mobile Users Do-Hyung Kim, Hwan-Gu Lee, Won-Tae Kim, Sun-Ja Kim, and Cheol-Hoon Lee Design of a Mobile Object Data Management Framework for Location-Enhanced Applications Yoon-Ae Ahn Design of Self-Directed E-Learning Material Recommendation System with On-Line Evaluation Feng-Jung Liu Designing a Taxonomy of Web Attacks Jung-Ying Lai, Jain-Shing Wu, Shih-Jen Chen, Chia-Huan Wu, and Chung-Huang Yang Development and Validation of a Physics-Based Brain Atlas Chunping Gao, Francis E.H. Tay, and Wieslaw L. Nowinski Development of Fault Detection System in Air Handling Unit Sang-Jo Youk, Seung-Sun Yoo, Bong-Keun Lee, Jeong-Ho Kho, and Geuk Lee Development of Internet Phone (VoIP) for Voice Security on VPN Environment Sang-Jo Youk, Seung-Sun Yoo, Bong-Keun Lee, Chang-Yong Lee, and Geuk Lee Document Summarization Using Non-Negative Matrix Factorization and Relevance Feedback Sun Park, Ju-Hong Lee, Deok-Hwan Kim, and Chan-Min Ahn Efficient and Secure Communication between Set-Top Box and Smart Card in IPTV Broadcasting Ji-Seon Lee, Hyun Sook Rhee, and Dong Hoon Lee viii

5 Environment-Aware Communication Model in the Perspective of Web Ecosystems Imran Ghani, Eunmi Choi, and Dugki Min Epiphyses Extraction Method Using Shape Information for Left Hand Radiography Jong-Min Lee and Whoi-Yul Kim Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks Shan Guo Quan and Young Yong Kim Finding the Near Workload Type between TPC-C and TPC-W Environments Jeong Seok Oh, Kyung Suhk Choi, Jeong Rock Kwon, and Sang Ho Lee Guaranteed Scheduling for Worst-Case in HR-WPAN Jae Eun Kang and Jong Kyu Lee Heart Rate Prediction Based on Physical Activity Using Feedforwad Neural Network Ming Yuchi and Jun Jo High-Level Modeling of UWB PHY for IEEE a Min-Su Kim, HoJun Kim, and Jong Tae Kim Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods Ki-Hyun Jung, Kyeoung-Ju Ha, and Kee-Young Yoo Implementation of LDPC Decoder in DVB-S2 Using Min-Sum Algorithm Haeseong Jeong and Jong Tae Kim Implementation of SEA Algorithm on the Windows Platforms Hui-Ting Hsieh, Chung-Huang Yang, and TaeNam Ahn Improving Quality of Life from Birth to Old Age with Ubiquitous Computing and Virtual Reality Sébastien Duval, Christian Hoareau, and Hiromichi Hashizume Integrated Session Control for Peer-to-Peer IPTV Services Seungchul Park Integration: Bridge Gap between Data Model and Process Model Ning Chen Intelligent Technique to Determine Behavior of Dimension Tables in Semi-Star Schema Generation Aisha Latif, M. Younus Javed, and Naveed S. Khattak Intermonth Regularity Classification of Volatile Mobile Internet Users Toshihiko Yamakami IPC-Based Cache Partitioning: An IPC-Oriented Dynamic Shared Cache Partitioning Mechanism Guang Suo, Xuejun Yang, Guanghui Liu, Junjie Wu, Kun Zeng, Baida Zhang, and Yisong Lin ix

6 Linkages Knowledge Process and Business Process: A Case Study in China Motor Corporation Ming-Chang Lee Low-Power AES Design Using Parallel Architecture Hyun Suk Choi, Joong Hyun Choi, and Jong Tae Kim Migration from Traditional Networks to Converged Next Generation Networks Architecture with Guaranteed Quality of Service Cherif Ghazel and Leila Saidane Mining Multidimensional Fuzzy Association Rules from a Normalized Database Rolly Intan and Oviliani Yenty MIRG: A Multimedia Information Retrieval GRID System Tae-Beom Lim, Sang Boem Lim, Kyoungro Yoon, James Lee, and Seok-Pil Lee Mixed Success on US.Cyworld: Reflections on Korean EFL College Student Efforts to Establish an L2 Presence on an American Social Networking Site Robert C. Meurant Mobile Services Acceptance Model Shang Gao, John Krogstie, and Per Anton Gransather Multi Layered System for High Performance Network Security Solution Dae-Hyo Lee, Hong-Sun Kim, and Tai-Myoung Chung Network Anomaly Detection System: The State of Art of Network Behaviour Analysis Shu Yun Lim and Andy Jones Network Forensic Analysis Using Visualization Effect Seung-hoon Kang and Juho Kim Noise Reduction for Image Signal Processor in Digital Cameras Yeul-Min Baek, Dong-Chan Cho, Jin-Aeon Lee, and Whoi-Yul Kim Pedestrian Counting Using an IR Line Laser Gwang-Gook Lee, Hyeong-ki Kim, Ja-Young Yoon, Jae-Jun Kim, and Whoi-Yul Kim Performance Evaluation of Adaptive Rate Control (ARC) over Ethernet Based PONs (EPONs) Surasee Prahmkaew Probability Distribution Reconstruction for Nominal Attributes in Privacy Preserving Classification Piotr Andruszkiewicz Profile Management Framework Based on Web Services for Providing Personalized Services Kyung-Sik Kim and Jae-Dong Lee Petite Feature Set Defining Solid Structural and Color Assets in CBIR Processes Waqas Rasheed, Wonil Yang, and Jongan Park x

7 Real-Time Data Stream Management System for Large Volume of RFID Events So Young Choi, Ho Min Jung, Ki Seok Bang, Wan Yeon Lee, and Young Woong Ko Reversible Watermarking Schemes Using Spatial Quad-Based Difference Expansion Zhiguo Chang, Jian Xu, and Weidong Kou RSS Delivery Architecture for Multi-User Terminals Using Push Service Seung-Hwa Chung S3H: A Secure Seamless and Soft Handover between WiMax and 3G Networks Ayesha Altaf, Faiza Iqbal, and M. Younus Javed Secret Distribution for Secure Fingerprint Verification Hanna Choi, Sungju Lee, Daesung Moon, Yongwha Chung, and Sungbum Pan Secure RFID Cross Certification Protocol Based on One-Time Random Number Seung-Min Lee, Jeong-Jai Kim, and Moon-Seog Jun Secured Smart Card Using Palm Vein Biometric On-Card-Process Rajendran Jeyaprakash, Jin Lee, Subir Biswas, and Jae Mook Kim Semantic Structural Similarity for Clustering XML Documents Tae-Soon Kim, Ju-Hong Lee, and Jae-Won Song Simple & Private Cricket Emergency Call System for Location-Based Service under U-911 in an Indoor Environment Jae-Bong Yoo, BumJung Yoo, SangYoon Kim, Young-Woong Ko, and Chan-Young Park Study of an Improved AKA Protocol Based on the SIM Card Ha-Yong Jeon, Yun-Seok Lee, and Min-Soo Jung Study on How to Build Global Computing Overlay Network RongHua Du and AiPing Li Survey and Analysis on Security Control Schemes for Operational System Evaluation Kab-Seung Kou, Seung-Yong Hur, and Gang-Soo Lee System and Method for Providing SIP-Based Conference Service without Memorizing Temporary Conference ID Wook Hyun and Shin-Gak Kang Target Clustering of Genes by Normal Mixture Model in Microarray Analysis Seung-Gu Kim The Analysis of Technology Progress and Production of Chinese Citrus Fruit Xiaoyin Wang, Yuhong Li, and Chunjie Qi The Convertible Undeniable Multi-Signature Scheme Suitable for Digital Copyright Protection SungHyun Yun and HeuiSeok Lim xi

8 The Study of Response Model & Mechanism Against Windows Kernel Compromises Dong Hwi Lee, Jae Myung Kim, Kyong-Ho Choi, and Kuinam J. Kim Threats Identification and their Solution in Inter-Basestation Dynamic Resource Sharing IEEE Rakhshanda Shaukat, Shoab Ahmed Khan, and Attiq Ahmed Training ANN for Image Discrimination Based on Wavelet Ning Chen User Authentication Mechanism Using Java Card for Personalized IPTV Services Youn-Kyoung Park, Sun-Hee Lim, Okyeon Yi, Sangjin Lee, and Soo-Hyung Kim User Demand Prediction-Based Resource Management Model in Grid Computing Environment Kyu Cheol Cho, Tae Young Kim, and Jong Sik Lee Visualized Voice Service System by VSXML Hung-Jen Chou, Yung-Wei Kao, Sheau-Ling Hsieh, and Shyan-Ming Yuan Wireless Digital Water Meter with Low Power Consumption for Automatic Meter Reading Young-Woo Lee, Seongbae Eun, and Seung-Hyueb Oh A Dynamic Routing Algorithm in Multicast Communication Networks Hee-Seon Jang, Jeom-Goo Kim, and Kee-Sung Cho A Fast Security Mechanism for Mobile Communication in Ubiquitous Computing Won-Goo Lee, Han-Jin Cho, and Jeom-Goo Kim A QoS Scheme for Multimedia Contents in Diffserv. Networks Tae-Wook Kim, Jun-Ho Lee, Kyung-Sang Sung, and Hae Seok Oh A Study of System-Based Model for Evaluating EF (Exposure Factor) in Quantitative Security Risk Analysis Young-Hwan Bang and Sang-Dong Lee A Study on Performance Evaluation of the Asymmetric Turbo Codes Byoung-Sup Shim, Seok-Jun Choi, Hyoung-Keun Park, Sun-Youb Kim, and Yu-Chan Ra A Study on the Encryption Algorithm for RFID Tag (SEED : 8 Rounds 64 bits block) Hoon Ko and Carlos Ramos A Study on the Improvement of Query Processing Performance of OWL Data Based on Jena Sun-Young Heo and Eun-Gyung Kim An Algorithm for Acquiring Reliable Path in Abnormal Traffic Condition Do-Hyeon Lee, Doo-Young Kim, Jae-Il Jung, and Young-Soo An Analysis of Dynamic Congestion Control of SCTP Doo-Won Seo, Hyuncheol Kim, and Jeom Goo Kim xii

9 Analytic Model of BEB Protocol with Voice/Data Class in Mobile Multimedia Networks Dong Chun Lee and Hong Jin Kim CDSS (Clinical Decision Support System) Architecture in Korea Jeong Ah Kim, InSook Cho, and Yoon Kim Design & Implementation of Mobile GUI Testing Tool Sun-Myung Hwang and Hyeon-Cheol Chae Design of Security Mechanism for Electronic Document Repository System SangYeob Na and SeungDae Lee Development of Advanced Cyber Education System Based on Grid Jongbae Moon, Chongam Kim, Yoonhee Kim, and Kum Won Cho Efficient Key Management for Three Dimensional Node Deployment in WSN Kyeong-Hyo Lee, Byeong-Kyun Oh, Seok-Kyun Han, and Sang-Gug Lee Evaluation of Security Lifecycle for the Quantitative Analysis Kim Young Jip and Eun-Ser Lee Extended OCBP Scheme for MIPv6 over IEEE e Networks Hyun Seung Park, Seunghwan Yun, Bum Han Kim, Dong Chun Lee, Okyeon Yi, and Sangjin Lee Framework for Quantitative S/W Development Performance Measurement and Analysis in Semiconductor Industry Ki-Won Song, Soo-Hwan Lee, Young-Gyun Jang, Il-Seok Suh, and Jin-Soo Kim Free-Traversing Syntactic and Semantic Comparison on Semi-Structured Languages Hyun-Joo Moon and Jae-Woo Yoo Image Gradient Detection with Hough Transform Seung-Joon Lee, Hyochang Ahn, Han-Jin Cho, Jun-Hwan Lee, and Sang-Burm Rhee MAGE: A Grid Management System Based on Mobile Agent and Multi-Layered Architecture Sungju Kwon and Eun-Ser Lee Measurement of Level of Quality Control Activities in Software Development [Quality Control Scorecards] Curtis (Jung-Soo) J. Kim, Sang-Min Kim, and Ki-Won Song MSPI (Multi-Spectral Protection Infrastructure) System for Optimal Network Security Si Choon Noh and Sang Yeob Na Occlusion Processing Method Using Improved Object Contour Extraction Algorithm by Neighboring Edge Search and MER in Simulation JeongHee Cha and HyunCheul Shin On-Line and Real Time Logistics Management System for Enhancing Customer Services Hyun-Chang Lee and Hyun-Cheul Shin xiii

10 Personal Color Decision System Using Fuzzy Logic Jung-Min Oh, Cheol-Soo Bang, and Geuk Lee Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer HyunGon Kim RFID Stamp with RFID Passive Reader Junki Kang, Namje Park, Yousung Kang, and Dooho Choi Security Management System for Sensor Network Shinkyung Lee, Namje Park, and Dooho Choi Software Architecture for Extensible Context-Aware Systems Jongmyung Choi Special Investigation of Variable Star Delta Cephei via Neural Network Sehwan Yoo, Jinsuk Kang, Jangho Lee, and Taikyeong Jeong Standardization Model and Implementation of Event Type in Real Time Cyber Threats Dong Hwi Lee, Kyong-Ho Choi, Jeom-Goo Kim, and Kuinam J. Kim The Study on the Maturity Measurement Method of Security Management for ITSM Jung-Oh Park, Sang-Geun Kim, Byeong-Hun Choi, and Moon-Seog Jun Author Index xiv

Deploying Access Control using Extended XACML in Open Web Service Environment

Deploying Access Control using Extended XACML in Open Web Service Environment Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a

More information

YEONG HO HA. DATE OF BIRTH August 10, 1953

YEONG HO HA. DATE OF BIRTH August 10, 1953 YEONG HO HA PRESENT POSITION AND ADDRESS Professor School of Electronics Engineering Kyungpook National University 80 Daehak-ro, Buk-gu, Daegu 41566, Korea Phone: +82-53-950-5535 FAX: +82-53-950-5505 E-MAIL:

More information

Department of Automation Engineering. Corporate R&D, Secutronix Inc., Seoul, Korea.

Department of Automation Engineering. Corporate R&D, Secutronix Inc., Seoul, Korea. DOSUNG AHN PH.D. Curriculum Vitae October 2007 Email: dosung@temple.edu / Phone: +1-215-204-3160 Adjunct Research Professor of Department of Electrical and Computer Engineering, Temple University, 1947

More information

Security-Enriched Urban Computing and Smart Grid

Security-Enriched Urban Computing and Smart Grid Tai-hoon Kim Adrian Stoica Ruay-Shiung Chang (Eds.) Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010 Daejeon, Korea, September 15-17, 2010 Proceedings 13 Volume

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

June 27th 2013 Bali, Indonesia. June 28th 2013 Bali, Indonesia Registration Open 09:00 ~

June 27th 2013 Bali, Indonesia. June 28th 2013 Bali, Indonesia Registration Open 09:00 ~ June 27th 2013 Bali, Indonesia 13:00~14:30 Committee Meeting For 2013 Conferences General Chair s Room June 28th 2013 Bali, Indonesia Registration Open 09:00 ~ 09:20~12:00 09:20~09:30 09:30~09:40 09:40~09:50

More information

Table of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi

Table of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi Table of Contents Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi A CMOS Analog Baseband for a 5GHzWLAN Direct-Conversion Receiver... 5 Mi-young

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

The Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse

The Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse Zhenghua XIN, Hong LI, Qixiang SONG,

More information

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment , pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

THE 7th INTERNATIONAL CONFERENCE on ADVANCED COMMUNICATION TECHNOLOGY

THE 7th INTERNATIONAL CONFERENCE on ADVANCED COMMUNICATION TECHNOLOGY THE 7th INTERNATIONAL CONFERENCE on ADVANCED COMMUNICATION TECHNOLOGY Phoenix Park, Korea Feb. 21-23, 2005 Host PROCEEDINGS Volume II Ministry of Information and Communication(MIC) IEEE Catalog Number

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

Convergence and its Application 2013 July 10-12, 2013, at Korea University, Seoul, South Korea

Convergence and its Application 2013 July 10-12, 2013, at Korea University, Seoul, South Korea Welcome Message from the Program Chair of ICCA 2013 The 1st International Conference on Convergence and its Application (ICCA 2013) is held on. ICCA 2013 will be the most comprehensive conference focused

More information

International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No.

International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2885-2888 A Survey of Various Method to improve the throughput of Zigbee Cluster

More information

ICNGC2016. The 1st International Conference on Next Generation Computing King Mongkut's University of Technology North Bangkok

ICNGC2016. The 1st International Conference on Next Generation Computing King Mongkut's University of Technology North Bangkok ICNGC2016 The 1st International Conference on Next Generation Computing 2016 Korean Institute of Next Generation Computing King Mongkut's University of Technology North Bangkok - 6 - The 1st International

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

SMART ENERGY MANAGEMENT SYSTEM

SMART ENERGY MANAGEMENT SYSTEM International Journal of Recent Innovation in Engineering and Research Scientific Journal Impact Factor - 3.605 by SJIF e- ISSN: 2456 2084 SMART ENERGY MANAGEMENT SYSTEM Mrs Ashwini Kale 1, Mr Jeevan Ugale

More information

Special Issue on Recent Trends on Convergence Personal Wireless System

Special Issue on Recent Trends on Convergence Personal Wireless System Wireless Pers Commun (2013) 73:169 174 DOI 10.1007/s11277-013-1227-4 EDITORIAL Special Issue on Recent Trends on Convergence Personal Wireless System Selected Topics from the ICITCS Conference on December

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere An Anti-Collision protocol of RFID Based on Divide and Conquer Algorithm Chen-Chung Liu, 1 and Yin-Tsung Chan 2 Department of Electronic Engineering National Chin-Yi University of Technology 1 ccl@ncut.edu.tw,

More information

Jong Kim EDUCATION EXPERIENCES

Jong Kim EDUCATION EXPERIENCES Jong Kim Department of IT Convergence Engineering Department of Computer Science and Engineering Pohang University of Science and Technology Pohang, 790-784, KOREA Phone: +(82)-54-279-2257 Email: jkim@postech.ac.kr

More information

Design of IP Sharing Device for Multimedia Streaming using UDP Datagram Switching Mechanism

Design of IP Sharing Device for Multimedia Streaming using UDP Datagram Switching Mechanism Design of IP Sharing Device for Multimedia Streaming using UDP Datagram Switching Mechanism Jong Wook Nam*, Kam Yong Kim*, Kee Sung Cho**, Hwa Suk Kim**, Seong Gon Choi* *School of Electrical & Computer

More information

Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization

Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization Nam Hoon Jo BS. Scholar, Department of Mechanical Engineering, Graduate School Kongju National University (KNU),

More information

Keywords: wearable system, flexible platform, complex bio-signal, wireless network

Keywords: wearable system, flexible platform, complex bio-signal, wireless network , pp.119-123 http://dx.doi.org/10.14257/astl.2014.51.28 Implementation of Fabric-Type Flexible Platform based Complex Bio-signal Monitoring System for Situational Awareness and Accident Prevention in Special

More information

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features Room B1 Title June 10 08:30-10:00 53 Proximity Comparison Modes for Logo Design 75 Flood Tracking in Severe Weather 138 Detection of Bus Route Number via Motion and YCbCr Features Chen-I Huang, Shing-Sheng

More information

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute Oral 011 Oral 016 Oral 017 Agile Project Management in MIS: A Case Study in A Research Institute Exploring Developing Countries Immigrants Intention to Use Information Communication Technology Partial

More information

CHEONGJU WORLD CUP 25th September till 01st October Cheongju (KR)

CHEONGJU WORLD CUP 25th September till 01st October Cheongju (KR) PPPQ M1 A NGUYEN HUU HANH VN PHAN MINH VIET VN 11:00 T1 25-09-17 PPPQ M2 B HUYNH TAN MY VN EIJI Ihara JP 11:00 T2 25-09-17 PPPQ M3 C CASADEMUNT MIGUEL ES LATORRE Christian CO 11:00 T3 25-09-17 PPPQ M4

More information

Providing Security to the Architecture of Presence Servers

Providing Security to the Architecture of Presence Servers Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,

More information

ICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by

ICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by KOREAN SOCIETY FOR INTERNET INFORMATION ICONI & APIC-IST 2010, December 16 20 Crimson Resort, Mac tan Island, Philippines Conference Program Host by Korean Society for Internet Information (KSII) Korea

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Curriculum Vitae Kyong Hoon Kim

Curriculum Vitae Kyong Hoon Kim Curriculum Vitae Kyong Hoon Kim Professor Department of Aerospace and Software Engineering (Undergraduate) Department of Informatics (Graduate) Gyeongsang National University Tel: +82-55-772-1375, E-mail:

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Abstract. 1. Introduction

Abstract. 1. Introduction 보안공학연구논문지 제 권제 호 년 월 Abstract In these days, many organizations try to manage their information system in safe way(i.e., Evaluation, Assurance and Certification of Information Security) due to more rapidly

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

Table of Contents. Paging Load Congestion Control in Cellular Mobile Networks Ioannis Z. Koukoutsidis

Table of Contents. Paging Load Congestion Control in Cellular Mobile Networks Ioannis Z. Koukoutsidis Table of Contents Self-Organization of Wireless Networks: The New Frontier (Keynote Speech)... 1 Sudhir Dixit The Impacts of Signaling Time on the Performance of Fast Handovers for MIPv6... 2 Seung-Hee

More information

Structure. Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung,

Structure. Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung, A High Performance 3D Graphics Rasterizer with Effective Memory Structure Woo-Chan Park, Kil-Whan Lee, Seung-Gi Lee, Moon-Hee Choi, Won-Jong Lee, Cheol-Ho Jeong, Byung-Uck Kim, Woo-Nam Jung, Il-San Kim,

More information

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七 104 年 03 月通過學術審查 年 級 :96 學年度入學, 博七 著作列表 Journal Papers 1. Cheng-Yen Lin, Chung-Wen Huang, Chi-Bang Kuan, Shi-Yu Huang, and Jenq-Kuen Lee, The Design and Experiments of A SID-Based Power-Aware Simulator

More information

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized Handover

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리

More information

Two Hierarchical Dynamic Load Balancing Algorithms in Distributed Systems

Two Hierarchical Dynamic Load Balancing Algorithms in Distributed Systems 29 Second International Conference on Computer and Electrical Engineering Two Hierarchical Dynamic Load Balancing Algorithms in Distributed Systems Iman Barazandeh Dept. of Computer Engineering IAU, Mahshahr

More information

Ind 1 I T I N O 2 P FO R P S M I I O

Ind 1 I T I N O 2 P FO R P S M I I O International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1569 Verilog Simulation of Multichannel NAND Flash M em or y 1 Komala.M1, Dr. K.R.Nataraj2, Dr.Mallikarjun Swamy3

More information

Development of a M2M Network-based Smart SMPS System

Development of a M2M Network-based Smart SMPS System , pp.60-64 http://dx.doi.org/10.14257/astl.2013 Development of a M2M Network-based Smart SMPS System Junho Ko 1, Yoon Sang Kim 1 1 Department of Computer Science and Engineering, KoreaUniversity of Technology

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,

More information

User-based secure digital content durability service support OSMU

User-based secure digital content durability service support OSMU User-based secure digital content durability service support OSMU DaeHee Seo 1, MiYeon Yoon 2, DongSub Cho 3, KabSeung Kou 4 Jang-Mi Baek 5 1 Electronics and Telecommunications Research Institute 2 Korea

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

CAIPT Yangon, Myanmar 23~24, June, Organized by. Hosted by. Sponsored by

CAIPT Yangon, Myanmar 23~24, June, Organized by. Hosted by. Sponsored by http://www.caipt.org CAIPT 2015 The 3 rd International Conference on Computer Applications and Information Processing Technology PR Yangon, Myanmar 23~24, June, 2015 Organized by Korea Information Processing

More information

Research on the Performance of JavaScript-based IoT Service Platform

Research on the Performance of JavaScript-based IoT Service Platform International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 9 Number 44 2016 Research on the Performance of JavaScript-based IoT Service Platform Jin-Tae

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Resume. [Awards] LG Yonam Overseas Professor Grant, US$ 30,000, 2001

Resume. [Awards] LG Yonam Overseas Professor Grant, US$ 30,000, 2001 Resume Last name: First name: Ju wook Home Address: 108-1701 Lottecastle classic apt Seocho-dong Seocho-Ku, Seoul Korea Date of birth: February 23 1961 Affiliation/Contact: Dept. of Electronic Eng. Sogang

More information

Research on the Knowledge Representation Method of Instance Based on Functional Surface

Research on the Knowledge Representation Method of Instance Based on Functional Surface 5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing

More information

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 Day 1, Feb. 14, 2017 Time Min HALL A HALL B HALL C 08:40-09:00 20 Registration 09:00-10:30 90 Session A-1 Chair : JongBeom Lim Session B-1 Chair : Guang-Ho Cha

More information

An Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-

An Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea- , pp.321-326 http://dx.doi.org/10.14257/astl.2013.29.68 An Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-

More information

The Research of Internet of Things in Operation and Maintenance for Distribution Grid

The Research of Internet of Things in Operation and Maintenance for Distribution Grid 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 The Research of Internet of Things in Operation and Maintenance for Distribution Grid Hengbo

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space

A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space , pp.70-74 http://dx.doi.org/10.14257/astl.2013.32.17 A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space Heangwoo Lee 1.1, Janghoo Seo 2.1, Yongseong Kim 2.2,

More information

Research Article Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

Research Article Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment Applied Mathematics, Article ID 208424, 8 pages http://dx.doi.org/10.1155/2014/208424 Research Article Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment Sang-Soo Yeo, 1 Dae-il

More information

Evolutionary Artificial Potential Fields and Their Application in Real Time Robot Path Planning

Evolutionary Artificial Potential Fields and Their Application in Real Time Robot Path Planning Evolutionary Artificial Potential Fields and Their Application in Real Time Robot Path Planning Prahlad Vadakkepat, Kay Chen Tan and Wang Ming-Liang Department of Electrical Engineering The National University

More information

Automatic Image Annotation by Classification Using Mpeg-7 Features

Automatic Image Annotation by Classification Using Mpeg-7 Features International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Automatic Image Annotation by Classification Using Mpeg-7 Features Manjary P.Gangan *, Dr. R. Karthi **

More information

Prediction of Elapsed Time based Wear Leveling for NAND Flash Memory in Embedded Systems

Prediction of Elapsed Time based Wear Leveling for NAND Flash Memory in Embedded Systems Prediction of Elapsed Time based Wear Leveling for NAND Flash Memory in Embedded Systems Sung Ho Kim Ph. D. Candidate, Department of Computer Engineering, Yeungnam University, 214-1 Dae-dong, Gyeongsan-si,

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs) Submission Title: [ETRI MAC Proposal on Color Packet ] Date Submitted: [23 September, 2009] Source: [Ill Soon Jang, Tae-Gyu

More information

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of

More information

One Communication Key Udate with Whitelist Attribute in SCADA System

One Communication Key Udate with Whitelist Attribute in SCADA System Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 3, May 2016 One Communication Key Udate with Whitelist Attribute in SCADA

More information

Fast Grain Shape Determination Algorithm Based on Parallel Processing

Fast Grain Shape Determination Algorithm Based on Parallel Processing 39 3 Vol.39, No.3 3 Opto-Electronic Engineering March, 3 5X(3 66 6,,,, (. ( Britton Chance 4374. 4374 (GPU (CUDA GPU (CPU 4 TP39 A.3969/j.issn.3-5X..3. Fast Grain Shape Determination Algorithm Based on

More information

A Novel Wireless Sensor Network Architecture Based on Cloud Computing and Big Data

A Novel Wireless Sensor Network Architecture Based on Cloud Computing and Big Data A Novel Wireless Network Architecture Based on Cloud Computing and Big Data https://doi.org/10.3991/ijoe.v13i12.7890 Changtong Song Zhenjiang College, Zhenjiang, China songchangtong@163.com Abstract To

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648 Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern

More information

Advanced Remote Control Infrastructure for Intelligent HEMS

Advanced Remote Control Infrastructure for Intelligent HEMS 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Advanced Remote Control Infrastructure for Intelligent HEMS Shun-Yu Chan 1 Jen-Hao

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Born December 03, 1984, ShanDong Province, China.

Born December 03, 1984, ShanDong Province, China. 1 Yibao Li Curriculum Vitae ADDRESS School of Mathematics and Statistics, Xian Jiaotong University, Xi an, Shaanxi, China, 710049 E-mail: yibaoli@mail.xjtu.edu.cn; yibao li@hotmail.com; yibaoli@korea.ac.kr

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

A Design and Implementation of a Stream Gateway Interface of a Home Station for Media Stream Transmission in Heterogeneous Home Networks

A Design and Implementation of a Stream Gateway Interface of a Home Station for Media Stream Transmission in Heterogeneous Home Networks A Design and Implementation of a Stream Gateway Interface of a Home Station for Media Stream Transmission in Heterogeneous Home Networks Young-Choong Park, Seung-Ok Lim, Kwang-Sun Choi, Kwang-Mo Jung,

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Samsung-ETRI Merged MAC Proposal to TG8 CFC] Date Submitted: [5 May 2014] Source: [Seung-Hoon Park, Kyungkyu Kim,

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Mutual Authentication Protocol for WSN on Medication Safety

Mutual Authentication Protocol for WSN on Medication Safety 2012 International Conference on Intelligent Information and Networks (ICIIN 2012) IPCSIT vol. 23 (2012) (2012) IACSIT Press, Singapore Mutual Authentication Protocol for WSN on Medication Safety Hsuan-Hsun

More information

M.S. in Information and Communications (Feb. 2003) Gwangju Institute of Science and Technology (GIST) in Korea, Advisor: Prof.

M.S. in Information and Communications (Feb. 2003) Gwangju Institute of Science and Technology (GIST) in Korea, Advisor: Prof. Dept. of Electrical Engineering and Computer Science, The University of Tennessee at Knoxville 327 Ferris Hall, Knoxville, Tennessee, USA, 37996 Mobile: +1-865-228-0961, Office: +1-865-974-5493, Fax: +1-865-974-5459,

More information

Mobile Edge Computing for 5G: The Communication Perspective

Mobile Edge Computing for 5G: The Communication Perspective Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE Volume 7 No. 22 207, 7-75 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

More information

S E U N G G Y U L E E

S E U N G G Y U L E E S E U N G G Y U L E E personal information Birth Republic of Korea, May 9 1989 e-mail sglee89@nims.re.kr 509sky@hanmail.net homepage http://elie.korea.ac.kr/ sky509 phone +82-042-717-5717 research interests

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 5, ISSUE

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 5, ISSUE EFFICIENT REVERSIBLE WATERMARKING TECHNIQUE FOR PROTECTED TEMPLATES OF BIOMETRIC AUTHENTICATION SYSTEM MRS. S. D. SHINDE M.E. Student, Department of Electronics Engineering, WIT, Solapur, India. itsashraddha@gmail.com

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System

Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System 88 Topology Optimization in Hybrid Tree/Mesh-based Peer-to-Peer Streaming System Tran Thi Thu Ha 1, Jinsul Kim 1, Jaehyung Park 1 Sunghyun Yoon 2, Ho-Yong Ryu 2 1 School of Electronics & Computer Engineering,

More information

Development of Massive Data Transferring Method for UPnP based Robot Middleware

Development of Massive Data Transferring Method for UPnP based Robot Middleware Development of Massive Data Transferring Method for UPnP based Robot Middleware Kyung San Kim, Sang Chul Ahn, Yong-Moo Kwon, Heedong Ko, and Hyoung-Gon Kim Imaging Media Research Center Korea Institute

More information

GURI WORLD CUP 29th Aug till 4th Sep GURI (KR)

GURI WORLD CUP 29th Aug till 4th Sep GURI (KR) PPPQ M1 A LEE Sun Woong KR CHO Su Hyun KR 11:00 T1 29-08-16 PPPQ M2 B NGUYEN Duc Toan VN MORTENSEN Marianne DK 11:00 T2 29-08-16 PPPQ M3 C NGUYEN Cu VN MORTENSEN Lukas DK 11:00 T3 29-08-16 PPPQ M4 D CAO

More information

A Repository Framework for Self-Growing Robot Software

A Repository Framework for Self-Growing Robot Software A Repository Framework for Self-Growing Robot Software Hyung-Min Koo, In-Young Ko Information and Communications University (ICU) 119 Munjiro, Yuseong-gu, Daejeon, 305-732, Korea {hyungminkoo, iko}@icu.ac.kr

More information

Contents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under

More information

A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing

A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing Youngji Yoo, Seung Hwan Park, Daewoong An, Sung-Shick Shick Kim, Jun-Geol Baek Abstract The yield management

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 1 of 4 TECHNISCHE INFORMATIONSBIBLiOTHEK UNIVERSITATSBiBLIOTHEK HANNOVCR November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

Design of Five Floors Elevator with SCADA System Based on S7200 PLC

Design of Five Floors Elevator with SCADA System Based on S7200 PLC Design of Five Floors Elevator with SCADA System Based on S7200 PLC Abdelkarim Ahmed Eltahir Ali 1, Zhang Jiang Min 2 1,2 Tianjin University of Technology and Education (TUTE), School of Electronics Engineering

More information

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net

More information