Lecture Notes in Electrical Engineering 448

Size: px
Start display at page:

Download "Lecture Notes in Electrical Engineering 448"

Transcription

1 Lecture Notes in Electrical Engineering 448 James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang Raymond Choo Editors Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech 2017

2 Lecture Notes in Electrical Engineering Volume 448 Board of Series editors Leopoldo Angrisani, Napoli, Italy Marco Arteaga, Coyoacán, México Samarjit Chakraborty, München, Germany Jiming Chen, Hangzhou, P.R. China Tan Kay Chen, Singapore, Singapore Rüdiger Dillmann, Karlsruhe, Germany Haibin Duan, Beijing, China Gianluigi Ferrari, Parma, Italy Manuel Ferre, Madrid, Spain Sandra Hirche, München, Germany Faryar Jabbari, Irvine, USA Janusz Kacprzyk, Warsaw, Poland Alaa Khamis, New Cairo City, Egypt Torsten Kroeger, Stanford, USA Tan Cher Ming, Singapore, Singapore Wolfgang Minker, Ulm, Germany Pradeep Misra, Dayton, USA Sebastian Möller, Berlin, Germany Subhas Mukhopadyay, Palmerston, New Zealand Cun-Zheng Ning, Tempe, USA Toyoaki Nishida, Sakyo-ku, Japan Bijaya Ketan Panigrahi, New Delhi, India Federica Pascucci, Roma, Italy Tariq Samad, Minneapolis, USA Gan Woon Seng, Nanyang Avenue, Singapore Germano Veiga, Porto, Portugal Haitao Wu, Beijing, China Junjie James Zhang, Charlotte, USA

3 About this Series Lecture Notes in Electrical Engineering (LNEE) is a book series which reports the latest research and developments in Electrical Engineering, namely: Communication, Networks, and Information Theory Computer Engineering Signal, Image, Speech and Information Processing Circuits and Systems Bioengineering LNEE publishes authored monographs and contributed volumes which present cutting edge research information as well as new perspectives on classical fields, while maintaining Springer s high standards of academic excellence. Also considered for publication are lecture materials, proceedings, and other related materials of exceptionally high quality and interest. The subject matter should be original and timely, reporting the latest research and developments in all areas of electrical engineering. The audience for the books in LNEE consists of advanced level students, researchers, and industry professionals working at the forefront of their fields. Much like Springer s other Lecture Notes series, LNEE will be distributed through Springer s print and electronic publishing channels. More information about this series at

4 James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang Raymond Choo Editors Advanced Multimedia and Ubiquitous Engineering MUE/FutureTech

5 Editors James J. (Jong Hyuk) Park Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea (Republic of) Kim-Kwang Raymond Choo Department of Information Systems and Cyber Security The University of Texas at San Antonio Adelaide Australia Shu-Ching Chen School of Computing and Information Sciences Florida International University Miami, FL USA ISSN ISSN (electronic) Lecture Notes in Electrical Engineering ISBN ISBN (ebook) DOI / Library of Congress Control Number: Springer Nature Singapore Pte Ltd This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore , Singapore

6 Message from the FutureTech2017 General Chairs FutureTech2017 is the 12th event of the series of international scientific conference. This conference will take place on May 22 24, 2017 in Seoul, South Korea. The aim of the FutureTech2017 is to provide an international forum for scientific research in the technologies and application of information technology. FutureTech 2017 is the next edition of FutureTech2016 (Beijing, China), FutureTech2015 (Hanoi, Vietnam), FutureTech2014 (Zhangjiajie, China), FutureTech2013 (Gwangju, Korea), FutureTech2012 (Vancouver, Canada), FutureTech2011 (Loutraki, Greece), FutureTech2010 (Busan, Korea, May 2010), which was the next event in a series of highly successful the International Symposium on Ubiquitous Applications & Security Services (UASS-09, USA, January 2009), previously held as UASS-08 (Okinawa, Japan, March 2008), UASS-07 (Kuala Lumpur, Malaysia, August, 2007), and UASS-06 (Glasgow, Scotland, UK, May, 2006). The conference papers included in the proceedings cover the following topics: Hybrid Information Technology, High-performance Computing, Cloud and Cluster Computing, Ubiquitous Networks and Wireless Communications, Digital Convergence, Multimedia Convergence, Intelligent and Pervasive Applications, Security and Trust Computing, IT Management and Service, Bioinformatics and Bio-inspired Computing, Database and Data Mining, Knowledge System and Intelligent Agent, Game and Graphics, and Human-centric Computing and Social Networks. Accepted and presented papers highlight new trends and challenges of future information technologies. We hope readers will find these results useful and inspiring for their future research. We would like to express our sincere thanks to Program Chairs: Ching-Hsien Hsu (Chung Hua University, Taiwan), Yunsick Sung (Dongguk University, Korea), Kwang-il Hwang (Incheon National University, Korea), Houcine Hassan (Universitat Politecnica de Valencia, Spain), Jin Wang (Yangzhou University, China), all Program Committee members, and all reviewers for their valuable efforts in the review process that helped us to guarantee the highest quality of the selected papers for the conference. v

7 vi Message from the FutureTech2017 General Chairs We cordially thank all the authors for their valuable contributions and the other participants of this conference. The conference would not have been possible without their support. Thanks are also due to the many experts who contributed to making the event a success. FutureTech 2017 General Chairs Kim-Kwang Raymond Choo Gangman Yi Jiannong Cao

8 Message from the FutureTech2017 Program Chairs Welcome to the 12th International Conference on Future Information Technology (FutureTech 2017), which will be held in Seoul, Korea, on May 22 24, FutureTech2017 will be the most comprehensive conference focused on the various aspects of information technologies. It will provide an opportunity for academic and industry professionals to discuss recent progress in the area of future information technologies. In addition, the conference will publish high-quality papers which are closely related to the various theories and practical applications in multimedia and ubiquitous engineering. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in these important subjects. For FutureTech2017, we received many paper submissions, and we accepted only articles with high quality for the FutureTech2017 proceedings after a rigorous peer-reviewed process. All submitted papers have undergone blind reviews by at least two reviewers from the technical program committee, which consists of leading researchers around the globe. Without their hard work, achieving such a high-quality proceeding would not have been possible. We take this opportunity to thank them for their great support and cooperation. We would like to sincerely thank the following invited speakers who kindly accepted our invitations, and, in this way, helped to meet the objectives of the conference: Prof. Weijia Jia, Director of Cyber-Space Intelligent Computing Lab, Shanghai Jiaotong University, China, and Prof. Han-Chieh Chao, President of National Dong Hwa University, Taiwan. vii

9 viii Message from the FutureTech2017 Program Chairs Finally, we would like to thank all of you for your participation in our conference, and also thank all the authors, reviewers, and organizing committee members. Thank you and enjoy the conference! FutureTech 2017 Program Chairs Ching-Hsien Hsu Yunsick Sung Houcine Hassan Kwang-il Hwang Jin Wang

10 Organization Honorary Chair Doo-soon Park SoonChunHyang University, Korea Steering Chairs James J. Park Young-Sik Jeong SeoulTech, Korea Dongguk University, Korea General Chairs Kim-Kwang Raymond Choo Gangman Yi Jiannong Cao The University of Texas at San Antonio, USA Dongguk University, Korea The Hong Kong Polytechnic University, Hong Kong Program Chairs Ching-Hsien Hsu Yunsick Sung Houcine Hassan Kwang-il Hwang Jin Wang Chung Hua University, Taiwan Dongguk University, Korea Universitat Politecnica de Valencia, Spain Incheon national University, Korea Yangzhou University, China ix

11 x Organization Workshop Chairs Chunho Jang Neal N. Xiong Keimyung University, Korea Northeastern State University, USA International Advisory Committee James J. Park Doo-soon Park Laurence T. Yang Jason C. Hung Jianhua Ma C.S. Raghavendra Philip S. Yu Hai Jin Yi Pan Shu-Ching Chen Victor Leung Vincenzo Loia Hsiao-Hwa Chen SeoulTech, Korea (Steering Chair) SoonChunHyang University, Korea St Francis Xavier University, Canada Oversea Chinese University, Taiwan Hosei University, Japan University of Southern California, USA University of Illinois at Chicago, USA Huazhong University of Science and Technology, China Georgia State University, USA Florida International University, USA University of British Columbia, Canada University of Salerno, Italy National Cheng Kung University, Taiwan Publicity Chairs Yi Pan Victor Leung Vincenzo Loia Hsiao-Hwa Chen Laurence T. Yang C.S. Raghavendra Philip S. Yu Hai Jin Qun Jin Yang Xiao Georgia State University, USA University of British Columbia, Canada University of Salerno, Italy National Cheng Kung University, Taiwan St Francis Xavier University, Canada University of Southern California, USA University of Illinois at Chicago, USA Huazhong University of Science and Technology, China Waseda University, Japan University of Alabama, USA Program Committee Abdelbadeeh Salem Alfredo Cuzzocrea Bing Chen Ain Shams University, Egypt University of Trieste, Italy Memorial University of Newfoundland, Canada

12 Organization Caldelli Roberto Chi-Fu Huang Epaminondas Kapetanios Guillermo Diaz-Delgado Huang Kuo-Chan Homenda Wladyslaw Irene Chang Joel Rodrigues Jeng-Shyang Pan Jinli Cao Jiqiang Lu Kyungbaek Kim Maumita Bhattacharya Mudasser Wyne Niketa Gandhi Qiang He Raylin Tso Ren-Song Ko Roberto Caldelli Ruben Rios Ryszard Tadeusiewicz Schahram Dustdar Seng Loke Soon M. Chung Shu-Ching Chen Suren Byna Tatjana Davidovic Weichao Wang Wookey Lee Yu-Chen Hu Yunquan Zhang Zoubir Mammeri xi University of Florence, Italy National Chung-Cheng University, Taiwan University of Westminster, UK Autonomous University of Queretaro, Mexico National Taichung University of Education, Taiwan Warsaw University of Technology, Poland Shih-Hsin University, Taiwan National Institute of Telecommunications, Brazil Fujian University of Technology, China La Trobe University, Australia Institute for Infocomm Research, Singapore Chonnam National University, Korea Charles Sturt University, Australia National University, USA University of Mumbai, India Swinburne University of Technology, Australia National Chengchi University, Taiwan National Chung Cheng University, Taiwan University of Florence, Italy University of Malaga, Spain AGH University of Science and Tech., Poland Technical University of Vienna, Austria La Trobe University, Australia Wright State University, USA Florida International University, USA Lawrence Berkeley National Lab, USA Serbian Academy of Sciences and Arts, Serbia University of North Carolina at Charlotte, USA Inha University, Korea Providence University, Taiwan Chinese Academy of Sciences, China Paul Sabatier University, France

13 Message from the MUE2017 General Chairs MUE 2017 is the 11th event of the series of international scientific conference. This conference will take place on May 22 24, 2017 in Seoul, South Korea. The aim of the MUE2017 is to provide an international forum for scientific research in the technologies and application of multimedia and ubiquitous engineering. Ever since its inception, International Conference on Multimedia and Ubiquitous Engineering has been successfully held as MUE-16 (Beijing, China), MUE-15 (Hanoi, Vietnam), MUE-14 (Zhangjiajie, China), MUE-13 (Seoul, Korea), MUE-12 (Madrid, Spain), MUE-11 (Loutraki, Greece), MUE-10 (Cebu, Philippines), MUE-09 (Qingdao, China), MUE-08 (Busan, Korea), and MUE-07 (Seoul, Korea). The conference papers included in the proceedings cover the following topics: Multimedia Modeling and Processing, Multimedia and Digital Convergence, Ubiquitous and Pervasive Computing, Ubiquitous Networks and Mobile Communications, Ubiquitous Networks and Mobile Communications, Intelligent Computing, Multimedia and Ubiquitous Computing Security, Multimedia and Ubiquitous Services, and Multimedia Entertainment. Accepted and presented papers highlight new trends and challenges of multimedia and ubiquitous engineering. We hope readers will find these results useful and inspiring for their future research. We would like to express our sincere thanks to Steering Chair: James J. (Jong Hyuk) Park (SeoulTech, Korea). Our special thanks go to the Program Chairs: Naveen Chilamkurti (La Trobe University, Australia), Jungho Kang (Soongsil University, Korea), Ka Lok Man, Xi an(jiaotong-liverpool University, China), Joon-Min Gil(Catholic University of Daegu, Korea), all Program Committee members, and all reviewers for their valuable efforts in the review process that helped us to guarantee the highest quality of the selected papers for the conference. MUE2017 General Chairs Shu-Ching Chen Yi Pan Jianhua Ma Young-Sik Jeong xiii

14 Message from the MUE2017 Program Chairs Welcome to the 11th International Conference on Multimedia and Ubiquitous Engineering (MUE 2017), which will be held in Seoul, South Korea, on May 22 24, MUE2017 will be the most comprehensive conference focused on the various aspects of multimedia and ubiquitous engineering. It will provide an opportunity for academic and industry professionals to discuss recent progress in the area of multimedia and ubiquitous environment. In addition, the conference will publish high-quality papers which are closely related to the various theories and practical applications in multimedia and ubiquitous engineering. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in these important subjects. For MUE2017, we received many paper submissions, and we accepted only articles with high quality for the MUE2017 proceedings after a rigorous peer-reviewed process. All submitted papers have undergone blind reviews by at least two reviewers from the technical program committee, which consists of leading researchers around the globe. Without their hard work, achieving such a high-quality proceeding would not have been possible. We take this opportunity to thank them for their great support and cooperation. Finally, we would like to thank all of you for your participation in our conference, and also thank all the authors, reviewers, and organizing committee members. Thank you and enjoy the conference! MUE 2017 Program Chairs Naveen Chilamkurti Jungho Kang Ka Lok Man Joon-Min Gil xv

15 Organization Honorary Chair Doo-soon Park SoonChunHyang University, Korea Steering Chair James J. Park SeoulTech, Korea General Chairs Shu-Ching Chen Yi Pan Jianhua Ma Young-Sik Jeong Florida International University, USA Georgia State University, USA Hosei University, Japan Dongguk University, Korea Program Chairs Naveen Chilamkurti Jungho Kang Ka Lok Man Joon-Min Gil La Trobe University, Australia Soongsil University, Korea Xi an Jiaotong-Liverpool University, China Catholic University of Daegu, Korea xvii

16 xviii Organization Workshop Chairs Kwangman Ko Shuo Xu Jun-Ho Huh Sangji University, Korea ISTIC, China Catholic University of Pusan, Korea International Advisory Committee Han-Chieh Weijia Jia Borko Furht Thomas Plagemann Roger Zimmermann Stephan Olariu Koji Nakano Chao National Ilan University, Taiwan Shanghai Jiaotong University, China Florida Atlantic University, USA University of Oslo, Norway National University of Singapore, Singapore Old Dominion University, USA University of Hiroshima, Japan Publicity Chairs Kehua Guo Zhi Li Ruisheng Shi Jaehwa Chung Ayaz Ahmad Qingchun Chen Junbo Wang Central South University, China Guizhou University, China Beijing University of Posts and Telecommunications, China Korea National Open University, Korea COMSATS Institute of Information Technology, Pakistan Southwest Jiaotong University, China University of Aizu, Japan Program Committee Afrand Agah Akihiro Sugimoto Angel D. Sappa Bin Lu Chao-Tung Yang Changsun Shin Daewon Lee Dakshina Ranjan Kisku Dongkyun Kim Guillermo Camara Chavez Hari Om West Chester University of Pennsylvania, USA National Institute of Informatics, Japan Universitat Autonoma de Barcelona, Spain West Chester University, USA Tunghai University, Taiwan Sunchon National University, Korea SeoKyeong University, Korea National Institute of Technology Durgapur, India KISTI, Korea Universidade Federal de Minas Gerais, Brazil Indian School of Mines University, India

17 Organization HaRim Jung Helen Huang Joel Rodrigue Jungong Han Kilhung Lee Kwang Sik Chung Lukas Ruf Marco Cremonini Mario Döller Paisarn Muneesawang Pascal Lorenz Quanqing Xu Rachid Anane Seunghae Kim Sokratis Katsikas Yong-Yoon Cho Zheng-Jun Zha xix Sungkyunkwan University, Korea The University of Queensland, Australia National Institute of Telecommunications (Inatel), Brazil Northumbria University, UK Seoul National University of Science and Technology, Korea Korea National Open University, Korea Consecom AG, Switzerland University of Milan, Italy University of Applied Sciences, Austria Naresuan University, Taipei University of Haute Alsace, France Data Storage Institute, A*STAR, Singapore Coventry University, UK KISTI, Korea University of Piraeus, Greece Sunchon National University, Korea National University of Singapore, Singapore

18 Contents Single Password Authentication Protocol... 1 Pramote Kuacharoen Performance Analysis of Congestion Control for Massive MTC Networks... 7 Yi-Yen Chen, Yu-Chee Tseng, and Jyh-Cheng Chen How to Train People to Increase Their Security Awareness in IT Agata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek, and Adam Wierzbicki Advanced Data Communication Framework for Cloud Computing from CDMI Jae-Yun Jeong and Jae-Woong Jeong A Study of AI Based E-learning System and Application Min-Gyu Shim and Jae-Woong Jeong A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware Junhak Lee and Jae-Woong Jeong Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera Hyeonsang Hwang, Daejune Ko, Mincheol Whang, and Eui Chul Lee Fake Fingerprint Detection Based on Statistical Moments Yosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko, and Eui Chul Lee Path Planning Method for Collision Avoidance of Multiple UAVs Hyeok Kim, Jeonghoon Kwak, Guichang Sim, and Yunsick Sung xxi

19 xxii Contents 3D UAV Flying Path Optimization Method Based on the Douglas-Peucker Algorithm Guichang Sim, Jaehwa Chung, and Yunsick Sung Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control Jihoon Yoon, Kangsik Shin, and Yoojae Won Property Analysis of SMS Spam Using Text Mining Manki Baek, Youngkyung Lee, and Yoojae Won An Automatic Patch Management System with Improved Security JunHee Kim, MinSeok Sohn, and YooJae Won An Empirical Study on the Relationship Between User Interface Design Attributes in Smartphone Applications and Intention to Use Wonjin Jung and HyungRok Yim Thumb Biometric Using Scale Invariant Feature Transform Naeun Lim, Daejune Ko, Kun Ha Suh, and Eui Chul Lee Image Classification Using Color and Spatial Frequency in Terms of Human Emotion Min Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon, and Eui Chul Lee Human Robot Interaction Method by Using Hand Gesture Recognition Jaehyun Han, Woohyuk Jang, Dojoon Jung, and Eui Chul Lee A Beacon-Based User Direction Estimating Method in Indoor Environments Jeonghoon Kwak and Yunsick Sung User Selection Based Backpropagation for Siamese Neural Networks in Visual Filters Hanju Park and Sukho Lee Methodological Route to Designing Optimized Bedroom Environment for Active-Aging Sung Jun Park Grayscale and Halftone Gel Lithography as Promising Techniques for Swelling-Induced Deformation of Smart Polymer Hydrogel Films Myunghwan Byun

20 Contents xxiii Methodology for Improving Usability Model of Multiple Devices Jeyoun Dong and Myunghwan Byun Development of SMART Base Isolation Using Linear Motion Guide Chunho Chang and Sangyoung Shin Analysis on Work Zone Characteristics in South Korean Expressways Using Text Mining Technique Oh Hoon Kwon, Je-Jin Park, and Shin Hyoung Park Seismic Performance Evaluation of a Prestressed I-Type Girder Bridge in Daegu for ICT Based Disaster Management in Daegu Metropolitan City Chunho Chang, Sung Jig Kim, and Shin Hyoung Park Implementation of Sitting Posture Monitoring System with Kinect Dong-Jun Shin, Min-Sang Kim, Wook Song, Se Dong Min, and Min Hong Solving the Subgraph Isomorphism Problem Using Harmony Search Hoyeong Yun, Yongjoon Joe, Byung-Ok Jung, Hyoguen Bang, and Dongmyung Shin Persuading Recommendations Using Customized Content Curation Keonsoo Lee and Yunyoung Nam Improving the Quality of an R-Tree Using the Map-Reduce Framework Viet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon, and Ha-Joo Song An Energy-Efficient and Reliable Routing Protocol for Cognitive Radio Sensor Networks Zamree Che-aron A Novel on Automatic K Value for Efficiency Improvement of K-means Clustering Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, and Chun-Bo Sim Study on Integrity Verification and Compatibility-Conflict Analysis for Safe Patching Jeongmin An, Sangmoon Jung, and Yoojae Won OFART: OpenFlow-Switch Adaptive Random Testing Dong-Su Koo and Young B. Park Patch Alarm and Collecting System Jaegeun Oh, Chaeho Cho, and Yoojae Won

21 xxiv Contents Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices Kisu Kim, Jongsoo Lee, and Wonkang Jung A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks Jong Won Lee, JiSu Park, Heung-Keun Kim, and Jin Gon Shon An Improved Pedestrian Detection System that Utilizes the HOG-UDP Algorithm Pyeong-Kang Kim, Hyung-Heon Kim, and Tae-Woo Kim An Approach to Fast Protocol Information Retrieval from IoT Systems Onur Soyer, Kwan-Young Park, Nomota Hiongun Kim, and Tae-soo Kim IoT Vulnerability Information Sharing System Taeho Seo A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration Sarang Na, Taeeun Kim, and Hwankuk Kim A Design of IoT Protocol Fuzzer Dae-il Jang, Taeeun Kim, and HwanKuk Kim A Study on the Management Structure of Vulnerability Information in IoT Environment Eunhye Ko, Taeeun Kim, and Hwankuk Kim Assessing the Impact of DoS Attacks on IoT Gateway Yungee Lee, Wangkwang Lee, Giwon Shin, and Kyungbaek Kim Low-Cost Infrared Video-Oculography for Measuring Rapid Eye Movements Youngsun Kong, Hyeonsoo Lee, Namik Kim, Seungyeon Lee, Jihwan Park, Taeyang Han, and Yunyoung Nam VM Relocation Method for Increase the Resource Utilization in Cloud Computing Sangwook Han, MinSoo Chae, and Hwamin Lee Challenges and Experiment with LoRaWAN Seung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim, and Byoung-Sup Shim Consumer s Behavioral System of Approach and Avoidance Investigating Generic Medicine Distribution and Logistics in Japan Takefumi Hosoda and Hongsik J. Cheon

22 Contents xxv Cross-Conforming Approaches of ICT Functionality Design for Smart City Jae-Young Ahn, Eunjun Rhee, Hyun-Woo Lee, and Dae Joon Hwang GUI-Based Korean Font Editing System Using Font Parameterization Technique Minju Son, Gyeongjae Gwon, Geunho Jeong, and Jaeyoung Choi Spatial Big Data Analysis System for Vehicle-Driving GPS Trajectory Wonhee Cho and Eunmi Choi i-shss: An IoT Based Smart Home Security System Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park The VM Weighted Filter Scheduling Algorithm for OpenStack Cloud Mohan Krishna Varma Nandimandalam and Eunmi Choi A Hierarchical Motion Estimation Based on the Properties of Motion Vectors for Low Complexity in Video Coding Hyo-Sun Yoon and Mi-Young Kim Research on Method of Technological Evolution Analysis Based on HLDA Liang Chen, Xiaoping Lei, Guancan Yang, and Jing Zhang A Mixture Record Linkage Approach for US Patent Inventor Disambiguation Guan-Can Yang, Cheng Liang, Zhang Jing, Dao-Ren Wang, and Hai-Chao Zhang The LTC Framework for Competitive Analysis on Industrial Technology Hongqi Han, Changqing Yao, Maoxiang Peng, and Yongsheng Yu Bayesian Multinomial Naïve Bayes Classifier to Text Classification Shuo Xu, Yan Li, and Zheng Wang CERIF: A Research Information Model for Electric Vehicles Decision Support System YingJie Zhang and Na Qi On Bypassing Page Cache for Block Devices on Storage Class Memory Jin Baek Kwon

23 xxvi Contents Applying Tensorflow with Convolutional Neural Networks to Train Data and Recognize National Flags Hoang Huu Duc and Keechul Jung An Empirical Study on the Effect of the Interpretability of Metaphors in UI on the Learnability of Mobile Apps Wonjin Jung and HyungRok Yim A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services Moon-Hwan Kang, Min Yoon, and Jae-Woo Chang A Kernel Density Estimation Model for Moving Object Detection Yulong Qiao and Wei Xi Detecting Bases of Maximal Cliques in a Graph Fei Hao, Doo-Soon Park, and Zheng Pei Forecasting Cultivable Region-Specific Crops Based on Future Climate Change Utilizing Public Big Data Yoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim, Sang Yub Han, Kee Hwan Kim, and Sungkap Cho Statistical Analysis of Determinants of Intention to Use Virtual Reality Services and Moderating Effects Young-Ho Hwang and Yoo-Jin Moon Real-Time Human Depression Diagnosis System Using Brain Wave Analysis Dongmin Shin, Yunjin Nam, Dongil Shin, and Dongkyoo Shin Deep Belief Network Based on Double Weber Local Descriptor in Micro-expression Recognition Xiao-li Hao and Miao Tian Design for Network File Forensics System Based on Approximate Matching Aonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, and Gang Xiong The Comparative Analysis of the Repeat Regions from the Assembled Contigs Jaehee Jung Senior Tourism and Information and Communication Technologies Blanka Klimova Wearable and Portable Monitoring Devices for Older People Blanka Klimova and Petra Maresova

24 Contents xxvii A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles Bayu Adhi Tama and Kyung-Hyune Rhee Learning Reaction Analysis Engine for Interactive Digital Textbook Platform Kwang Sik Chung Rule-Based Topic Trend Analysis by Using Data Mining Techniques Yunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon, Hansaem Park, and In-Jeong Chung A Case Study of Hierarchical Safety Analysis for Eliciting Traceable Safety Requirements Daehui Jeong, Anit Thapaliya, and Gihwon Kwon Smart Home Technology and Energy Savings with a Special Focus on Europe Blanka Klimova, Petra Maresova, and Ondrej Krejcar Senior Citizens Views of Using Medical Technologies Case Study in Central Europe Petra Maresova and Jaroslav Kacetl Audiences Counting in Cinema by Detecting Occupied Chairs Zhitong Su, Jun Lan, Wei Song, Simon Fong, and Yifei Tian Efficient Distributed Index Structure and Encrypted Query Processing Scheme for Cloud Computing Environment Yeonwoo Jang, Hyunjo Lee, and Jae-Woo Chang A Data Encryption Scheme Using Periodic Functions for Efficient Query Processing on Encrypted Data Hyunjo Lee, Youngho Song, and Jae-Woo Chang Software Product Line Lifecycle Management-Integration Engineering and Management Process Jeong Ah Kim and Jin Seok Yang OLSR Improvement with Link Live Time for FANETs Yan Jiao, Wenyu Li, and Inwhee Joe An Efficient Partition-Based Filtering for Similarity Joins on MapReduce Framework Miyoung Jang, Archana B. Lokhande, Naeun Baek, and Jae-Woo Chang A Study of Algorithm Replacement Mechanism for Environment Adaptive Load Balancer JongMin Lee and Young B. Park

25 xxviii Contents Face Recognition Based on Enhanced CSLBP Chen Li, Shuai Zhao, Ke Xiao, and Yanjie Wang A Supporting Environment for Formal Analysis of Cryptographic Protocols Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, and Jingde Cheng Modeling and Simulation of LoRa in OPNET Andrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee, Inwhee Joe, Kyeseon Lee, and Tae-Joon Park Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity Jihun Kim and Jonghee M. Youn Mongolian Internet Consumers Attitude Towards Web Advertising Bulganmaa Togookhuu, Junxing Zhang, and Wuyungerile Li A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism Gyungchang Lee, Kyoil Chung, and Cheong Youn Progressive Motion Artifact Removal in PPG Signal for Accurate Heart Rate Estimation Ji Hun An, Heemang Song, and Hyun-Chool Shin A Case Study on How to Predict Café Profit: A Dimension Reduction via Factor Analysis Jeong-Hyeon Moon, Chae-Young Yun, Seon-Joo Park, and Kyung-Ah Sohn Motion Blurred Shadows Using a Hybrid Approach MinhPhuoc Hong and Kyoungsu Oh Design of ECG Data Compression Algorithm for Efficient M2M-Based Mass Biometric Data Transmission Jae-Sung Shim, Seung-Su Yang, Young-Hwan Jang, Yong-Wan Ju, and Seok-Cheon Park Design of Clustering Algorithm for Efficient Energy Management in Wireless Sensor Network Environments Seung-Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju, and Seok-Cheon Park Design of a Framework for Security Enhancement in Telematics Control Units (TCUs) Kiyoung Jang, Suhong Shin, and Byoungsoo Koh

26 Contents xxix Improved Data Stream Clustering Algorithm for Anomaly Detection Chunyong Yin, Sun Zhang, and Jin Wang Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System Chunyong Yin, Lian Xia, and Jin Wang Short Text Classification Technology Based on KNN+Hierarchy SVM Chunyong Yin, Lingfeng Shi, and Jin Wang Spectral Response Based Regularization Parameter Selection for Total Variation Image Restoration Yuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, and Jin Wang Face Recognition for Mobile Self-authentication with Online Model Update Seon Ho Oh and Geon-Woo Kim Prototype System Design for Large-Scale Person Re-identification Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi, and Geon-Woo Kim Topic Modeling for Learner Question and Answer Analytics Kyungrog Kim, Hye Jin Song, and Nammee Moon A Model of Energy-Awareness Predictor to Improve the Energy Efficiency Svetlana Kim and Yong-Ik Yoon A Novel Structure Tensor Using Nonlocal Total Variation Operator Yin Yu, Kai Ma, Yuhui Zheng, and Jin Wang Gaussian Mixture Model Based Image Denoising Method with Local Constraints Min Li, Yuhui Zheng, Shunfeng Wang, and Jin Wang A Study on Secure Protocol Techniques Supporting TCUs in a Telematics Environment Byoungsoo Koh and Suhong Shin Development of Test Agents for Automated Dynamic Testing of UNIWAY Seoung-Hyeon Lee and Jung-Chan Na Multi-step Prediction for Time Series with Factor Mining and Neural Network Mingji Zhou, Jin Liu, Fei Li, and Jin Wang

27 xxx Contents A Vision-Based Approach for Deep Web Form Extraction Jiachen Pu, Jin Liu, and Jin Wang Questions Classification with Attention Machine Yunlu Liaozheng, Jin Liu, and Jin Wang Development of Unidirectional Security Gateway Satisfying Security Functional Requirements Seon-Gyoung Sohn, Jungchan Na, and Kyung-Soo Lim Context Based Multiple Players Identification in Sports Images MiYoung Nam, Jun-Young Lee, Sung Youb Kim, and YoungGiu Jung A Study of the Factors Influencing Information Security Policy Compliance: Focusing on the Case of K Institute Gwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil, and Hark-Soo Park Safe-Driving Aid System Using Bi-directional Cameras Byoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon, and Jong Hyuk Park Telling Computer and Human Apart: Image-Sound Based CAPTCHA System Jung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, and Jong Hyuk Park Author Index

28 Single Password Authentication Protocol Pramote Kuacharoen (&) Department of Computer Science, Graduate School of Applied Statistics, National Institute of Development Administration, Bangkok 10240, Thailand Abstract. Internet users usually subscribe to a few online services. Remembering a different password for each service becomes a burden and a challenge for some. As a result, many Internet users frequently use the same password for multiple accounts. This kind of practice is risky since each service has a different security level. For example, an online community site has a weaker security measure than an online bank site. If an attacker has compromised a lower security service and obtained the user s password, the attacker may be able to identify other accounts and use the stolen password. Therefore, reusing passwords becomes a security risk, and is not generally recommended. This paper tries to mitigate the risk of reusing an identical password for multiple accounts by implementing a single password authentication protocol. The proposed protocol does not expose the user s password in the event of the server or the communication line has been breached. Keywords: Single password authentication Mutual authentication Authentication 1 Introduction Authentication is the process of verifying the identity of the subject by comparing one or more factors against a database of valid identities, such as user accounts. There are three categories of authentication factors of verifying a user s identity [1, 2, 3]: Knowledge factors are something the individual knows which include a password and a personal identification number (PIN). Possession factors are something the individual has, such as a smart card and cryptographic token. Inherence factors are some individual characteristics or something the individual does which include static and dynamic biometrics such as fingerprint, retina, face, voice pattern, handwriting characteristic, and keystroke dynamics. The knowledge factors are the most commonly used form of authentication. The user is required to supply a secret such as a password, which matches the one stored in the server in order to be authenticated. Due to its simplicity and convenience, password-based authentication is widely adopted. Many online services require users to register and provide the credentials in the form of username and password. The users can later authenticate themselves using the Springer Nature Singapore Pte Ltd J.J. (Jong Hyuk) Park et al. (eds.), Advanced Multimedia and Ubiquitous Engineering, Lecture Notes in Electrical Engineering 448, DOI / _1

29 2 P. Kuacharoen registered user credentials. Internet users usually subscribe to more than one online services. For security reasons, the users should use a different password for each service. However, remembering a different password for each service becomes a burden and a challenge for some. As a result, many Internet users frequently use the same password for multiple accounts. This kind of practice is risky since each service has a different security level. For example, an online community site has a weaker security measure than an online banking site. Even worse, a lower security site may store passwords in clear text form and may run a buggy web application. Attackers may be able to use an SQL injection attack to obtain the user s password [4]. If an attacker has compromised a lower security service and has obtained the user s password, the attacker may be able to identify other accounts and use the stolen password. Therefore, reusing passwords becomes a security risk, and is not generally recommended. In this paper, a single password authentication protocol is proposed to mitigate the risk of reusing an identical password for multiple accounts. The proposed protocol does not expose the user s password in the event of the server or the communication line has been breached. Although the protocol helps reduce the risk, the user should be cautious using an identical password for multiple accounts. There are other attack techniques which can be deployed to steal password. For instance, an attacker may perform a shoulder surfing attack while the user is authenticated in a public place. 2 Background and Related Work This section provides background and related work which includes password authentication and existing single password protocols. 2.1 Password Authentication Password authentication is the simplest form of authentication. Because of its simplicity, the password authentication is commonly used in authenticating the user over the Internet. The user registers a username and a password as credentials. The server needs to store the user s credentials in order to verify the user. When the user logs into the server, the user simply presents the username and the password to the authenticating entity [5, 6]. The server checks the user s credentials against the database of valid identities. If the values match, the user is authenticated. Otherwise, the authentication fails. The passwords stored at the server must be protected. Storing passwords in clear text is inadvisable. This is because a compromised user database file reveals all passwords. The attack can use the obtained passwords on other systems. The attacker may be able to obtain the password database through an SQL injection attack. Instead of storing passwords in clear text, the hash values of the passwords should be saved. However, a weakness of using the hash value is that two users with the same password have an identical hash value. Furthermore, the attacker can use dictionary attack against the entire user database. The best way to protect password is to employ salted password

30 Single Password Authentication Protocol 3 hashing. The server randomly generates a random number called salt and calculates the hash of the salt and the password. Therefore, two users with the same password have different salted passwords. The server stores the salt and the salted password along with other information. Upon logging in, the user supplies the username and the password. The server computes the hash value of the salt and the received password, and then compares the resulting value to the stored hash value. If the two values are identical, the user is authenticated. Both username and password are sent to the server. Sending password in clear text is vulnerable to eavesdropping. Using an SSL connection helps protect the conversation during transit. However, it does not prevent phishing attacks. 2.2 Single Password Protocols Rose et al. present a method to improve password security and to defend against password phishing [7]. The server stores the hash of the user s password and the domain name. When the user enters the username and the password is prefixed with two escape characters, the browser extension applies a cryptographic hash function to a combination of the password and the domain name. The username and the hash value are sent to the server. The domain name is automatically obtained. If the user enters the credential on the phishing page, the phisher cannot obtain the clear text password. Moreover, the hash value is different from the one stored on the actual server since the phishing site is in a different domain name. Using domain name as salt has a drawback. The attacker may compromise a server under the same domain and may set up a phishing page. The correct salted password can be captured. Since password and domain name remains unchanged, the salted password is the same, making it susceptible to replay attacks. Gouda et al. propose a protocol that allows a client to securely use a single password across multiple servers and prevents phishing attacks [8]. The client can be authenticated without revealing the password to the server at any point. The protocol employs a one-time ticket technique. The client sets the next authentication ticket. The ticket consists of the hash of the random number, the password, and the server name. The client identifies himself by sending the identity. The server challenges with previously stored random numbers. Subsequently, the client computes the ticket using the received number. The client also randomly generates a number and uses it to create the next authentication ticket. The client responds with the current ticket, the next challenge random number, and the hash value of the next authentication ticket. Although the clear text password remains unchanged, the ticket changes each time the client is authenticated. This is equivalent to changing the password at the server every time the user signs in, which makes the protocol susceptible to message modification attacks. Consider the scenario where an attacker intercepts the response from the client. The attacker then can create a ticket using his password and replaces the hash value with the one generated from his ticket. The server has no way to verify the authenticity of the hash value. Hence, the attacker can log in.

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 Day 1, Feb. 14, 2017 Time Min HALL A HALL B HALL C 08:40-09:00 20 Registration 09:00-10:30 90 Session A-1 Chair : JongBeom Lim Session B-1 Chair : Guang-Ho Cha

More information

Intelligent Systems Reference Library

Intelligent Systems Reference Library Intelligent Systems Reference Library Volume 145 Series editors Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: kacprzyk@ibspan.waw.pl Lakhmi C. Jain, University of Canberra, Canberra,

More information

Polymeric Biomaterials for Tissue Regeneration

Polymeric Biomaterials for Tissue Regeneration Polymeric Biomaterials for Tissue Regeneration Changyou Gao Editor Polymeric Biomaterials for Tissue Regeneration From Surface/Interface Design to 3D Constructs Editor Changyou Gao Department of Polymer

More information

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017

PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 PROGRAM SCHEDULE FOR WOLRD IT CONGRESS 2017 Day 1, Feb. 14, 2017 Time Min HALL A HALL B HALL C 08:40-09:00 20 Registration 09:00-10:30 90 Session A-1 Chair : JongBeom Lim Session B-1 Chair : 10:30-10:40

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series editors Stan Zdonik, Brown University, Providence, Rhode Island, USA Shashi Shekhar, University of Minnesota, Minneapolis, Minnesota, USA Xindong Wu, University

More information

Failure-Modes-Based Software Reading

Failure-Modes-Based Software Reading SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming

More information

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment , pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department

More information

Arbee L.P. Chen ( 陳良弼 )

Arbee L.P. Chen ( 陳良弼 ) Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of

More information

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Department of Automation Engineering. Corporate R&D, Secutronix Inc., Seoul, Korea.

Department of Automation Engineering. Corporate R&D, Secutronix Inc., Seoul, Korea. DOSUNG AHN PH.D. Curriculum Vitae October 2007 Email: dosung@temple.edu / Phone: +1-215-204-3160 Adjunct Research Professor of Department of Electrical and Computer Engineering, Temple University, 1947

More information

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七 104 年 03 月通過學術審查 年 級 :96 學年度入學, 博七 著作列表 Journal Papers 1. Cheng-Yen Lin, Chung-Wen Huang, Chi-Bang Kuan, Shi-Yu Huang, and Jenq-Kuen Lee, The Design and Experiments of A SID-Based Power-Aware Simulator

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

Research Article. Three-dimensional modeling of simulation scene in campus navigation system

Research Article. Three-dimensional modeling of simulation scene in campus navigation system Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):103-107 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Three-dimensional modeling of simulation scene

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Global Entertainment & Media Outlook.

Global Entertainment & Media Outlook. Global Entertainment & Media Outlook 2018 2022 www.pwc.com/outlook Perspectives: 2018 Outlook report summary Trending now: convergence, connections and trust PwC 2 Perspectives report So what s trending

More information

Real-Time Graphics Rendering Engine

Real-Time Graphics Rendering Engine Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Implementation of Color based Android Shuffling Pattern Lock

Implementation of Color based Android Shuffling Pattern Lock Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

The Analysis of D-CATV VOD Service Users and Their Usage Patterns. Abstract

The Analysis of D-CATV VOD Service Users and Their Usage Patterns. Abstract 2 : D-CATV VOD (Won Young Kang et al.: The Analysis of D-CATV VOD Service Users and Their Usage Patterns) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.931

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

YEONG HO HA. DATE OF BIRTH August 10, 1953

YEONG HO HA. DATE OF BIRTH August 10, 1953 YEONG HO HA PRESENT POSITION AND ADDRESS Professor School of Electronics Engineering Kyungpook National University 80 Daehak-ro, Buk-gu, Daegu 41566, Korea Phone: +82-53-950-5535 FAX: +82-53-950-5505 E-MAIL:

More information

Enhancing Intelligent Video Analytics with Machine Learning

Enhancing Intelligent Video Analytics with Machine Learning Enhancing Intelligent Video Analytics with Machine Learning Dennis Sng Deputy Director & Principal Scientist NVIDIA AI Conference 24 October 2017 ROSE LAB OVERVIEW 2 1 Visual Object Categorisation 2D (Planar)

More information

Recent advances in security and privacy in big data

Recent advances in security and privacy in big data University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2015 Recent advances in security and privacy in

More information

Forum. Ningbo, China 25 February

Forum. Ningbo, China 25 February 2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee

More information

Implementation of Omni-directional Image Viewer Program for Effective Monitoring

Implementation of Omni-directional Image Viewer Program for Effective Monitoring 2 : (So-Yeon Jeon et al.: Implementation of Omni-directional Image Viewer Program for Effective Monitoring) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.939

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

A Kinect Sensor based Windows Control Interface

A Kinect Sensor based Windows Control Interface , pp.113-124 http://dx.doi.org/10.14257/ijca.2014.7.3.12 A Kinect Sensor based Windows Control Interface Sang-Hyuk Lee 1 and Seung-Hyun Oh 2 Department of Computer Science, Dongguk University, Gyeongju,

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 5, ISSUE

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 5, ISSUE EFFICIENT REVERSIBLE WATERMARKING TECHNIQUE FOR PROTECTED TEMPLATES OF BIOMETRIC AUTHENTICATION SYSTEM MRS. S. D. SHINDE M.E. Student, Department of Electronics Engineering, WIT, Solapur, India. itsashraddha@gmail.com

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

Research Article DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

Research Article DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments Hindawi Publishing Corporation e Scientific World Journal Volume 2014, Article ID 264654, 7 pages http://dx.doi.org/10.1155/2014/264654 Research Article DS-ARP: A New Detection Scheme for ARP Spoofing

More information

Research on the Knowledge Representation Method of Instance Based on Functional Surface

Research on the Knowledge Representation Method of Instance Based on Functional Surface 5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Sentiment Analysis for Customer Review Sites

Sentiment Analysis for Customer Review Sites Sentiment Analysis for Customer Review Sites Chi-Hwan Choi 1, Jeong-Eun Lee 2, Gyeong-Su Park 2, Jonghwa Na 3, Wan-Sup Cho 4 1 Dept. of Bio-Information Technology 2 Dept. of Business Data Convergence 3

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition

More information

A New Logging-based IP Traceback Approach using Data Mining Techniques

A New Logging-based IP Traceback Approach using Data Mining Techniques using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of

More information

Low Level X Window Programming

Low Level X Window Programming Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN

More information

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ) Rockwell Automation PartnerNetwork Portal Single Sign-on (SSO) Login to Rockwell Automation PartnerNewtork Portal for Commercial Programs Participants Scope: This job aid provides instructions on how to

More information

Jong Kim EDUCATION EXPERIENCES

Jong Kim EDUCATION EXPERIENCES Jong Kim Department of IT Convergence Engineering Department of Computer Science and Engineering Pohang University of Science and Technology Pohang, 790-784, KOREA Phone: +(82)-54-279-2257 Email: jkim@postech.ac.kr

More information

The Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse

The Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Intelligent Transportation System Using the Infrared Sensors Based on the ZigBee Protocol and Eclipse Zhenghua XIN, Hong LI, Qixiang SONG,

More information

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1

More information

Security-Enriched Urban Computing and Smart Grid

Security-Enriched Urban Computing and Smart Grid Tai-hoon Kim Adrian Stoica Ruay-Shiung Chang (Eds.) Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010 Daejeon, Korea, September 15-17, 2010 Proceedings 13 Volume

More information

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks Sensors 2014, 14, 6443-6462; doi:10.3390/s140406443 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Security Analysis and Improvements of Two-Factor Mutual Authentication with Key

More information

Research on the Performance of JavaScript-based IoT Service Platform

Research on the Performance of JavaScript-based IoT Service Platform International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 9 Number 44 2016 Research on the Performance of JavaScript-based IoT Service Platform Jin-Tae

More information

Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System

Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System Eun Ji Kim and Mun Yong Yi (&) Department of Knowledge Service Engineering, KAIST, Daejeon,

More information

Keywords: wearable system, flexible platform, complex bio-signal, wireless network

Keywords: wearable system, flexible platform, complex bio-signal, wireless network , pp.119-123 http://dx.doi.org/10.14257/astl.2014.51.28 Implementation of Fabric-Type Flexible Platform based Complex Bio-signal Monitoring System for Situational Awareness and Accident Prevention in Special

More information

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI * 2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement 1 Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi School of Applied Sciences, Gautam Buddha University, Greater Noida, India sonamdevgan11@gmail.com,

More information

Improving digital infrastructure for a better connected Thailand

Improving digital infrastructure for a better connected Thailand Improving digital infrastructure for a better connected 1 Economies across the globe are going digital fast The Global GDP forecast 2017 Economies are setting policies to encourage ICT investment Global

More information

Global entertainment and media outlook Explore the content and tools

Global entertainment and media outlook Explore the content and tools www.pwc.com/outlook Global entertainment and media outlook Explore the content and tools A comprehensive online source of global analysis for consumer/ end-user and advertising spending 5-year forecasts

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.10, No.4, pp.00~00, December 2014 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information

Mutual Authentication Protocol for WSN on Medication Safety

Mutual Authentication Protocol for WSN on Medication Safety 2012 International Conference on Intelligent Information and Networks (ICIIN 2012) IPCSIT vol. 23 (2012) (2012) IACSIT Press, Singapore Mutual Authentication Protocol for WSN on Medication Safety Hsuan-Hsun

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Efficient RFID Authentication protocol for Ubiquitous Computing Environment

Efficient RFID Authentication protocol for Ubiquitous Computing Environment Efficient RFID Authentication protocol for Ubiquitous Computing Environment Eun Young Choi 1, Su Mi Lee 1, and Dong Hoon Lee 2 Center for Information Security Technologies(CIST), Korea University, 1, 5-Ka,

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 8, August 2012 pp. 5499 5511 A SMART CARD BASED AUTHENTICATION SCHEME FOR

More information

Trajectory analysis. Ivan Kukanov

Trajectory analysis. Ivan Kukanov Trajectory analysis Ivan Kukanov Joensuu, 2014 Semantic Trajectory Mining for Location Prediction Josh Jia-Ching Ying Tz-Chiao Weng Vincent S. Tseng Taiwan Wang-Chien Lee Wang-Chien Lee USA Copyright 2011

More information

Security Access in Wireless Local Area Networks

Security Access in Wireless Local Area Networks Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless Local Area Networks From Architecture and Protocols to Realization Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of September, 2007 Summarization of September Report Findings The total number of unique phishing reports submitted to APWG in September 2007 was 38,514, an

More information

Purchasing. Operations 3% Marketing 3% HR. Production 1%

Purchasing. Operations 3% Marketing 3% HR. Production 1% Agenda Item DOC ID IAF CMC (11) 75 For Information For discussion For decision For comments to the author IAF End User Survey results (October 211) This report summarises the total responses to the IAF

More information

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle. 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System The Role of SANAS in Support of South African Regulatory Objectives Mr. Mpho Phaloane South African National Accreditation System Outline of Presentation INTRODUCTION STATUS OF SANAS TECHNICAL INFRASTRUCTURE

More information

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News Selecting Model in Automatic Text Categorization of Chinese Industrial 1) HUEY-MING LEE 1 ), PIN-JEN CHEN 1 ), TSUNG-YEN LEE 2) Department of Information Management, Chinese Culture University 55, Hwa-Kung

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert

More information

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University

More information

An Efficient Learning Scheme for Extreme Learning Machine and Its Application

An Efficient Learning Scheme for Extreme Learning Machine and Its Application An Efficient Learning Scheme for Extreme Learning Machine and Its Application Kheon-Hee Lee, Miso Jang, Keun Park, Dong-Chul Park, Yong-Mu Jeong and Soo-Young Min Abstract An efficient learning scheme

More information

Comparative Analysis of Smart Card Authentication Schemes

Comparative Analysis of Smart Card Authentication Schemes IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

Multi-dimensional database design and implementation of dam safety monitoring system

Multi-dimensional database design and implementation of dam safety monitoring system Water Science and Engineering, Sep. 2008, Vol. 1, No. 3, 112-120 ISSN 1674-2370, http://kkb.hhu.edu.cn, e-mail: wse@hhu.edu.cn Multi-dimensional database design and implementation of dam safety monitoring

More information

ICACT2011 Status Report

ICACT2011 Status Report Smart Service Innovation through Mobile Interactivity The 13 th International Conference on Advanced Communication Technology ICACT2011 Status Report February 2011 ICACT2011 Secretariat http://www.icact.org

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Hole repair algorithm in hybrid sensor networks

Hole repair algorithm in hybrid sensor networks Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Hole repair algorithm in hybrid sensor networks Jian Liu1,

More information

E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application

E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education kydman@koreatech.ac.kr

More information

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING Gagandeep Kaur, Dr. Gagandeep Abstract Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative

More information

User-based secure digital content durability service support OSMU

User-based secure digital content durability service support OSMU User-based secure digital content durability service support OSMU DaeHee Seo 1, MiYeon Yoon 2, DongSub Cho 3, KabSeung Kou 4 Jang-Mi Baek 5 1 Electronics and Telecommunications Research Institute 2 Korea

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Young-Hwa An* * Division of Computer and Media Information Engineering, Kangnam University 111, Gugal-dong,

More information

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)> RoboCup 2014 Rescue Simulation League Team Description Fu Jiang, Jun Peng, Xiaoyong Zhang, Tao Cao, Muhong Guo, Longlong Jing, Zhifeng Gao, Fangming Zheng School of Information Science

More information

GUANGHAN NING Pinard St, Milpitas, CA, 95035

GUANGHAN NING Pinard St, Milpitas, CA, 95035 GUANGHAN NING 573-825-8230 gnxr9@mail.missouri.edu 2294 Pinard St, Milpitas, CA, 95035 EDUCATION Ph.D. Candidate, Electrical and Computer Engineering, University of Missouri, Columbia, MO, Supervisor:

More information

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of

More information

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

More information

Analyzing Patterns with Timelines on Researcher Data

Analyzing  Patterns with Timelines on Researcher Data Analyzing Email Patterns with Timelines on Researcher Data Jangwon Gim 1, Yunji Jang 1, Do-Heon Jeong 1,*, Hanmin Jung 1 1 Korea Institute of Science and Technology Information (KISTI) 245 Daehak-ro, Yuseong-gu,

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

A Survey On Different Text Clustering Techniques For Patent Analysis

A Survey On Different Text Clustering Techniques For Patent Analysis A Survey On Different Text Clustering Techniques For Patent Analysis Abhilash Sharma Assistant Professor, CSE Department RIMT IET, Mandi Gobindgarh, Punjab, INDIA ABSTRACT Patent analysis is a management

More information