Table of Contents - Part I

Similar documents
IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

Research on Heterogeneous Communication Network for Power Distribution Automation

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Collaboration System using Agent based on MRA in Cloud

Proxy Mobile IPv6 (PMIPv6)

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Study on Issues Associated with Mobile Network

Security-Enriched Urban Computing and Smart Grid

Research on Design and Application of Computer Database Quality Evaluation Model

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

A Study on the IoT Sensor Interaction Transmission System based on BigData

Innovative M-Tech projects list IEEE papers

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks


SMART ENERGY MANAGEMENT SYSTEM

ZigBee Routing Algorithm Based on Energy Optimization

LIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP

Table of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Applicability Estimation of Mobile Mapping. System for Road Management

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

Design and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No.

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Research Article. Three-dimensional modeling of simulation scene in campus navigation system

Providing Security to the Architecture of Presence Servers

Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization

Preface List of Acronyms

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

The simulation and emulation verification that was based on NS-2

Geospatial Information Service Based on Ad Hoc Network

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

ICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

UPnP-Based Telematics Service Discovery for Local Hot-Spots

Power Control Performance Evaluation for Efficiency in D2D Cellular Network

Overview of Mobile Networking Initiatives at WINLAB

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION

2017 International Conference on Communication Technologies (ComTech 2017)

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide

Reliable Routing In VANET Using Cross Layer Approach

3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography

COMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

Urban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

One Communication Key Udate with Whitelist Attribute in SCADA System

Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet

Subject: Adhoc Networks

Mobile Edge Computing for 5G: The Communication Perspective

Contents. Foreword to Second Edition. Acknowledgments About the Authors

Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Cooperative Spectrum Sharing Scheme for Wireless Sensor Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Mobile Computing. Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.)

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

YEONG HO HA. DATE OF BIRTH August 10, 1953

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

Development of MF-TDMA based Satellite Network System Simulation Model

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

Pre-Qual Groups. EL GOUNA WORLD CUP 03 till 09 December Hurghada (EG) Group Match players T-car T-Inn T-car T-Inn Av MP 1st HR 2nd HR A

Nowadays data-intensive applications play a

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

A Study on Different Challenges in Facial Recognition Methods

Multimedia Document Communications over Wireless Network

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Collaborative Security Attack Detection in Software-Defined Vehicular Networks

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Transcription:

Table of Contents - Part I Workshop on Geographical Analysis, Urban Modeling, Spatial statistics (GEO-AN-MOD 2009) Using Causality Relationships for a Progressive Management of Hazardous Phenomena with Sensor Networks 1 Nafaa Jabeur and Hedi Haddad Design and Development of an Intelligent Extension for Mapping Landslide Susceptibility Using Artificial Neural Network 17 Mohammad H. Vahidnia, Ali A. Alesheikh, Abbas Alimohammadi, and Farhad Hosseinali Integrating Fuzzy Logic and GIS Analysis to Assess Sediment Characterization within a Confined Harbour 33 Nicoletta Gazzea, Andrea Taramelli, Emiliana Valentini, and Maria Elena Piccione Integrated Geological, Geomorphological and Geostatistical Analysis to Study Macroseismic Effects of 1980 Irpinian Earthquake in Urban Areas (Southern Italy) 50 Maria Danese, Maurizio Lazzari, and Beniamino Murgante Using GIS to Develop an Efficient Spatio-temporal Task Allocation Algorithm to Human Groups in an Entirely Dynamic Environment Case Study: Earthquake Rescue Teams 66 Ali Reza Vafaeinezhad, Ali Asghar Alesheikh, Majid Hamrah, Reza Nourjou, and Rouzbeh Shad A GIS-Based SW Prototype for Emergency Preparedness Management Applied to a Real Case Study 79 Marco Scaioni, Mario Alba, Renato Rota, and Simona Caragliano Spatial Analysis of Humidity and Temperature of Iran 94 Amir Kavousi and Mohammad Reza Meshkani An Evaluation of the Performance of the CHIMERE Model over Spain Using Meteorology from MM5 and WRF Models 107 Marta G. Vivanco, Inmaculada Palomino, Fernando Martin, Magdalena Palacios, Oriol Jorba, Pedro Jiménez, José María Baldasano, and Oier Azula Parameter-Less GA Based Crop Parameter Assimilation with Satellite Image 118 Shamim Akhter, Keigo Sakamoto, Yann Chemin, and Kento Aida Bibliografische Informationen http://d-nb.info/994394624 digitalisiert durch

XIV Table of Contents - Part I Compactness and Flow Minimization Requirements in Reforestation Initiatives: An Integer Programming (IP) Formulation 132 Pablo Vanegas, Dirk Cattrysse, and Jos Van Orshoven Application of the Urban Green Assessment Model for the Korean Newtowns 148 Sangkeun Eom and Seungil Lee Modeling Un-authorized Land Use Sprawl with Integrated Remote Sensing-GIS Technique and Cellular Automata 163 Norzailawati Mohd. Noor and Mazlan Hashim A Study on the Driving Forces of Urban Expansion Using Rough Sets 176 Yong Ge and Feng Cao Assessing the Impact of Individual Attitude towards Otherness on the Structure of Urban Residential Space: A Multi-actor Model 189 André Ourednik Incorporation of Morphological Properties of Buildings' Descriptors Computed from GIS and LIDAR Data on an Urban Multi-agent Vector Based Geo-simulator 205 Claudio Carneiro, Vitor Silva, and François Golay A Spatial Structural and Statistical Approach to Building Classification of Residential Function for City-Scale Impact Assessment Studies 221 Dimitrios P. Triantakonstantis and Stuart L. Barr Spatial Distribution of Social Benefit Given by Urban Attractions: A Test of UrAD Model 237 Luca D'Acci Economic Evaluation and Statistical Methods for Detecting Hot Spots of Social and Housing Difficulties in Urban Policies 253 Silvestro Montrone, Massimo Bilancia, Paola Perchinunno, and Carmelo Maria Torre An Urban Study of Crime and Health Using an Exploratory Spatial Data Analysis Approach 269 Su- Yin Tan and Robert Haining Geospatial Crime Scene Investigation - From Hotspot Analysis to Interactive 3D Visualization 285 Markus Wolff and Hartmut Asche Agent-Based Distributed Component Services in Spatial Modeling 300 Allan J. Brimicom.be, Yang Li, Abdullah Al-Zakwani, and Chao Li

Table of Contents - Part I XV A Cellular Automata-Ready GIS Infrastructure for Geosimulation and Territorial Analysis 313 Ivan Blecic, Andrea Borruso, Arnaldo Cecchini, Antonio D'Argenio, Fabio Montagnino, and Giuseppe A. Trunfio An Integrated Methodology for Medieval Landscape Reconstruction: The Case Study of Monte Sérico 328 Maria Danese, Marilisa Biscione, Rossella Coluzzi, Rosa Lasaponara, Beniamino Murgante, and Nicola Masini Neural Network Based Cellular Automata Model for Dynamic Spatial Modeling in GIS 341 Yogesh Mahajan and Parvatham Venkatachalam A Model-Based Scan Statistics for Detecting Geographical Clustering of Disease 353 Massimo Bilancia, Silvestro Montrone, and Paola Perchinunno New Prospects in Territorial Resource Management: The Semantic Web GIS 369 Ernesto Marcheggiani, Michèle Nucci, and Andrea Galli Analysing the Role of Accessibility in Contemporary Urban Development 385 Henning Sten Hansen An Indoor Crowd Simulation Using a 2D-3D Hybrid Data Model 397 Chulmin Jun and Hyeyoung Kim Measuring Effectiveness of Pedestrian Facilities Using a Pedestrian Simulation Model 413 Seunjae Lee, Seunjun Lee, and Shinhae Lee Impact of the Norm on Optimal Locations 426 Marc Ciligot-Travain and Didier Josselin Designing Road Maintenance Data Model Using Dynamic Segmentation Technique 442 Mohammad Reza Jelokhani-Niaraki, AH Asghar Alesheikh, Abbas Alimohammadi, and Abolghasem Sadeghi-Niaraki GeoSOM Suite: A Tool for Spatial Clustering 453 Roberto Henriques, Fernando Baçâo, and Victor Lobo Handling Spatial-Correlated Attribute Values in a Rough Set 467 Hexiang Bai and Yong Ge Rough Qualitative Spatial Reasoning Based on Rough Topology 479 Anahid Bassiri, Mohammad R. Malek, and Ali A. Alesheikh

XVI Table of Contents - Part I An Integrative Approach to Geospatial Data Fusion 490 Silvija Stankutè and Hartmut Asche Designing Data Warehouses for Geographic OLAP Querying by Using MDA 505 Octavio Glorio and Juan Trujillo Turning Point Clouds into 3d Models: The Aqueduct of Segovia 520 Juan Mancera-Taboada, Pablo Rodriguez-Gonzálvez, and Diego González-Aguilera Design and Implementation of a GSM Based Automatic Vehicle Location System 533 Ali Mousavi, Mohammad A. Rajabi, and Mohammad Akbari Temporal Relationships between Rough Time Intervals 543 Anahid Bassiri, Mohammad R. Malek, Ali A. Alesheikh, and Pouria Amirian Inverse Transformation for Several Pseudo-cylindrical Map Projections Using Jacobian Matrix 553 Cengizhan Ipbuker Workshop on Wireless and Ad Hoc Networking (WAD 2009) A Cluster-Based Mobility Model for Intelligent Nodes 565 Morteza Romoozi, Hamideh Babaei, Mahmood Fathy, and Mojtaba Romoozi A Scalability Analysis of TDMA-Based Ad Hoc MAC Protocols 580 Sang-Chul Kim and Chong-Woo Woo Noun and Keyword Detection of Korean in Ubiquitous Environment... 593 Seong-Yoon Shin, Oh-Hyung Kang, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee Phased Scene Change Detection in Ubiquitous Environments 604 Seong-Yoon Shin, Ji-Hyun Lee, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee A File Carving Algorithm for Digital Forensics 615 Deok-Gyu Park, Sang-Joon Park, Jong-Chan Lee, Si-Young No, and Seong-Yoon Shin Data Discovery and Related Factors of Documents on the Web and the Network 627 Hyun-Joo Moon, Sae-Hun Yeom, Jongmyung Choi, and Chae-Woo Yoo

Table of Contents - Part I XVII Thorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes 636 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Issues for Applying Instant Messaging to Smart Home Systems 649 Jongmyung Choi, Sangjoon Park, Hoon Ko, Hyun-Joo Moon, and Jongchan Lee The Scheme of Handover Performance Improvement in WiBro 662 Wongil Park Workshop on PULSES V- Logical, Scientific and Computational Aspects of Pulse Phenomena in Transitions (PULSES 2009) Study of the Correlation between the Concrete Wall Thickness Measurement Results by Ultrasonic Pulse Echo and the PTF Model for Assymetrical Functions 671 Ludan Pusca Detection Weak Period Signal Using Chaotic Oscillator 685 Qizhong Liu and Wanqing Song Energy Metrics and Sustainability 693 Mory Ghomshei and Francesco Villecco The Ultrasonic Measurement for Object Vibration 699 Li-Ping Zhang and Qiu Yu The Generalized Wavelets Based on Meyer Wavelet 708 Xudong Teng and Xiao Yuan Reconstructing Microwave Near-Field Image Based on the Discrepancy of Radial Distribution of Dielectric Constant 717 Zhifu Tao, Qifeng Pan, Meng Yao, and Ming Li Fractals Based on Harmonic Wavelets 729 Carlo Cattani Modelling Hodgkin-Huxley Neurons Interaction 745 Gianni Mattioli and Massimo Scalia Workshop on High-Performance Computing and Information Visualization (HPCIV 2009) Fourth Order Approximation with Complexity Reduction Approach for the Solution of Time Domain Maxwell Equations in Free Space 752 Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas. Jumat Sulaiman, and Fatimah Ahmad

XVIII Table of Contents - Part I Nine Point-EDGSOfl: Iterative Method for the Finite Element Solution of 2D Poisson Equations 764 Jumat Sulaiman, Mohamed Othman, and Mohammad Khatim Hasan An Online and Predictive Method for Grid Scheduling Based on Data Mining and Rough Set 775 Asgarali Bouyer, Mohammadbagher Karimi, and Mnsour Jalali A Survey of Cloud Platforms and Their Future 788 Milad Pastaki Rad, Ali Sajedi Badashian, Gelare Meydanipour, Morteza Ashurzad Delcheh, Mahdi Alipour, and Hamidreza Afzali Workshop on Sensor Network and its Applications (SNA 2009) An Efficient Clustering Protocol with Reduced Energy and Latency for Wireless Sensor Networks 797 A. Allirani and M. Suganthi Dynamic Threshold Control-Based Adaptive Message Filtering in Mobile Sensor Networks 810 Sung Ho Jang, Yong Beam Ma, and Jong Sik Lee Design of a Reliable Traffic Control System on City Area Based on a Wireless Network 821 Junghoon Lee, In-Hye Shin, and Cheol Min Kim Design of a Cache Management Scheme for Gateways on the Vehicular Telematics Network 831 Junghoon Lee, In-Hye Shin, Gyung-Leen Park, Ik-Chan Kim, and Yoon-Jung Rhee An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6L0WPAN 841 Sun-Min Hwang and Eui-Nam Huh Relationship Based Privacy Management for Ubiquitous Society 853 Yuan Tian, Biao Song, and Eui-Nam Huh Real-Time Monitoring of Ubiquitous Wearable ECG Sensor Node for Healthcare Application 868 Do-Un Jeong and Hsein-Ping Kew Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment 885 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung

Table of Contents - Part I XIX Workshop on Collective Evolutionary Systems (IWCES 2009) A Triangular Formation Strategy for Collective Behaviors of Robot Swarm 897 Xiang Li, M. Fikret Ercan, and Yu Fai Fung P2P Incentive Mechanism for File Sharing and Cooperation 912 Junghwa Shin, Taehoon Kim, and Sungwoo Tak Modeling Agents' Knowledge in Collective Evolutionary Systems 924 Rajdeep Niyogi and Alfredo Milani Collective Evolutionary Indexing of Multimedia Objects 937 C.H.C. Leung, W.S. Chan, and J. Liu A Hybrid Approach for Selecting Optimal COTS Products 949 Pankaj Gupta, Mukesh Kumar Mehlawat, Garima Mittal, and Shilpi Verma Author Index 963

Table of Contents - Part II Workshop on Software Engineering Processes and Applications (SEPA 2009) Ontology-Based Requirements Conflicts Analysis in Activity Diagrams 1 Chi-Lun Liu Resource Allocation Optimization for GSD Projects 13 Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, and Jigang Liu Verification of Use Case with Petri Nets in Requirement Analysis 29 Jinqiang Zhao and Zhenhua Duan Towards Guidelines for a Development Process for Component-Based Embedded Systems 43 Rikard Land, Jan Carlson, Stig Larsson, and Ivica Crnkovic Effective Project Leadership in Computer Science and Engineering 59 Ferid Cafer and Sanjay Misra Weyuker's Properties, Language Independency and Object Oriented Metrics 70 Sanjay Misra Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009) Lattice Constant Prediction of A 2 BB'O6 Type Double Perovskites 82 Abdul Majid, Muhammad Farooq Ahmad, and Tae-Sun Choi A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients 93 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Direct Quantum Calculations of Rate Coefficients 104 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Chimère: Ozone Production in Central Italy 115 Antonio Lagana, Stefano Crocchianti, Alessandro Costantini, Monica Angelucei, and Marco Vecchiocattivi

XXII Table of Contents - Part II Workshop on Internet Communication Security (WICS 2009) MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT 130 Sergio Pozo, A.J. Várela-Vaca, and Rafael M. Gasea Testing Topologies for the Evaluation of IPSEC Implementations 145 Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, and Amparo Fúster-S'abater Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key 155 Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, and Héctor Plaza López Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009) Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server Environment 164 Youngsook Lee and Dongho Won Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords 173 Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, and Ung Mo Kim Smart Card Based AKE Protocol Using Biometrie Information in Pervasive Computing Environments 182 Wansuck Yi, Seungjoo Kim, and Dongho Won A Practical Approach to a Reliable Electronic Election 191 Kwangwoo Lee, Yunho Lee, Seungjoo Kim, and Dongho Won Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key 204 Mijin Kim, Heasuk Jo, Seungjoo Kim, and Dongho Won Workshop on Mobile Communications (MC 2009) Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments 212 Eun Cheol Kim and Jin Young Kim Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System 226 Eun Cheol Kim and Jin Young Kim

Table of Contents - Part II XXIII Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition 237 Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, and Min Young Chung A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System 250 Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, and Min Young Chung Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes 261 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System 276 Jong Sung Lee and Dong In Kim WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up 286 Jung-Hyun Kim, Hyeong-Joon Kwon, and Kwang-Seok Hong Overlay Ring Based Secure Group Communication Scheme for Mobile Agents 302 Hyunsu Jang, Kwang Sun Ko, Young-woo Jung, and Young Ik Eom Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems 314 Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, and Seokho Yoon AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization 325 Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, and Seokho Yoon Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol 335 Jin-Seong Kim and Tae-Jin Lee Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks 345 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors 361 Moonseong Kim and Matt W. Mutka

XXIV Table of Contents - Part II Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code 372 Taekhoon Kim and Dong In Kim Design of an Efficient Multicast Scheme for Vehicular Telematics Networks 383 Junghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, and Sang Joon Kim ODDUGI: Ubiquitous Mobile Agent System 393 SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, and EunJoung Byun Determination of the Optimal Hop Number for Wireless Sensor Networks 408 Jin Wang and Young-Koo Lee Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models 419 Viet-Duc Le, Young-Koo Lee, and Sungyoung Lee A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs 432 Jin Wang and Sungyoung Lee Analysis of Moving Patterns of Moving Objects with the Proposed Framework 443 In-Hye Shin, Gyung-Leen Park, Abhijit Saha, Ho-young Kwak, and Hanil Kim A User-Defined Index for Containment Queries in XML 453 Gap-Joo Na and Sang- Won Lee On Optimal Placement of the Monitoring Devices on Channels of Communication Network 465 Alexey Rodionov, Olga Sokolova, Anastasia Yurgenson, and Hyunseung Choo Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks 479 Seungtak Oh and Hyunseung Choo A Capacity Aware Data Transport Protocol for Wireless Sensor Network 491 Md. Obaidur Rahman, Muhammad Mostafa Monowar, and Choong Seon Hong

Table of Contents - Part II XXV Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs) 503 Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, and Yoon-Jung Rhee VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems 513 Junwoo Jung, Hoki Baek, and Jaesung Lim Towards Location-Based Real-Time Monitoring Systems in u-lbs 525 MoonBae Song and Hyunseung Choo General Track on Computational Methods, Algorithms and Applications A Fast Approximation Algorithm for the k Partition-Distance Problem 537 Yen Hung Chen A PSO - Line Search Hybrid Algorithm 547 Ximing Liang, Xiang Li, and M. Fikret Ercan Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation 557 Alexey Rodionov, Olga Rodionova, and Hyunseung Choo A Novel Tree Graph Data Structure for Point Datasets 572 Saeed Behzadi, Ali A. Alesheikh, and Mohammad R. Malek Software Dependability Analysis Methodology 580 Beoungil Cho, Hyunsang Youn, and Eunseok Lee New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model 594 Kisoeb Park, Seki Kim, and William T. Shaw Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus 605 Xiaojuan Cai and Yonggen Gu YAO: A Software for Variational Data Assimilation Using Numerical Models 621 Luigi Nardi, Charles Sorror, Fouad Badran, and Sylvie Thiria General Track on High Performance Technical Computing and Networks CNP: A Protocol for Reducing Maintenance Cost of Structured P2P... 637 Yu Zhang, Yuanda Cao, and Baodong Cheng

XXVI Table of Contents - Part II A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control 653 Youqiang Guo, Zijun Zhang, and Xuezhu Pei On-Demand Chaotic Neural Network for Broadcast Scheduling Problem 664 Kushan Ahmadian and Marina Gavrilova General Track on Advanced and Emerging Applications Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones 677 Feng Qian, Qinming He, and Jiangfeng He Computerized Detection of Pulmonary Nodule Based on Two- Dimensional PCA 693 Wook-Jin Choi, Abdul Majid, and Tae-Sun Choi Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map 703 Adriana Vlad, Adrian Luca, and Madalin Frunzete Future Personal Health Records as a Foundation for Computational Health 719 Robert Steele and Amanda Lo SVM Based Decision Analysis and Its Granular-Based Solving 734 Tian Yang, Xinjie Lu, Zaifei Liao, Wei Liu, and Hongan Wang Fast Object Tracking in Intelligent Surveillance System 749 Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, and Moon-hyun Kim A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence 764 Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud, and Oksam Chae Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition 780 Ali Amiri and Mahmood Fathy Content Quality Assessment Related Frameworks for Social Media 791 Kevin Chai, Vidyasagar Potdar, and Tharam Dillon Weighted Aspect Moment Invariant in Pattern Recognition 806 Rela Puteri Pamungkas and Siti Mariyam Shamsuddin

Table of Contents - Part II XXVII Multiple Object Types KNN Search Using Network Voronoi Diagram... 819 Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina Gavrilova, and Bala Srinivasan General Track on Information Systems and Information Technologies RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS... 835 Xinjie Lu, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, and Hongan Wang A Dynamic Packet Management in a Protocol Processor 851 Yul Chu, Amit Uppal, and Jae Sok Son On a Construction of Short Digests for Authenticating Ad Hoc Networks 863 Khoongming Khoo, Ford Long Wong, and Chu- Wee Lim Learning and Predicting Key Web Navigation Patterns Using Bayesian Models 877 Malik Tahir Hassan, Khurum Nazir Junejo, and Asim Karim A Hybrid IP Forwarding Engine with High Performance and Low Power 888 Junghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, and Jinsoo Kim Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning 900 Nilüfer Atman, Mustafa Murat Inceoglu, and Burak Galip Asian State of the Art in Semantic Focused Crawlers 910 Hai Dong, Farookh Khadeer Hussain, and Elizabeth Chang Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid 925 Toshihiro Uchibayashi, Bernady O. Apduhan, Wenny J. Rahayu, David Taniar, and Norio Shiratori Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of Evidence 937 Yan Wu, Ming Li, Haitao Zong, and Xin Wang Author Index 953