IT Convergence and Security 2012

Voorkant
Kuinam J. Kim, Kyung-Yong Chung
Springer Science & Business Media, 12 dec. 2012 - 1244 pagina's

The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals.

The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

 

Wat mensen zeggen - Een review schrijven

We hebben geen reviews gevonden op de gebruikelijke plaatsen.

Inhoudsopgave

76 MultiHop Relay Protocol Techniques for Performance Enhancement of LTE Downlink System
633
77 Performance Improvement Using Single CarrierFDMA in Relay Based LTE Uplink System
645
78 An Efficient HighSpeed Traffic Control Scheme for RealTime Multimedia Applications in Wireless Networks
656
79 Interference Assessment on the Circuit Domain in GSMR Networks by Grey Clustering and Analytic Hierarchy Process
667
80 Design of Transducer Interface Agent and its Protocol for WSN Middleware
676
81 Collaboration of ThinThick Clients for Optimizing Data Distribution and Resource Allocation in Cloud Computing
685
82 Mutual Exclusion Algorithm in Mobile Cellular Networks
695
83 An Effective Personalized Service Provision Scheme for Ubiquitous Computing Environment
703

8 Protecting Advertisers Against Click Frauds
61
9 A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme ARS
71
10 Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment
79
11 A Study About Security Awareness Program Based on RFID Access Control System
86
12 A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method
93
13 An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management
101
14 Designing a Model for Context Awareness Based Reliable AuctionRecommending System CARARS by Utilizing Advanced Information
111
Part III Security Protocols and Applications
119
15 A Secure SelfEncryption Scheme for Resource Limited Mobile Devices
120
16 A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value
131
17 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
141
18 An IdentityBased Ring Signcryption Scheme
150
19 A Secure DSCDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks
159
20 A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent
168
21 Internet Anonymity in Syria Challenges and Solution
177
Part IV Convergence Security
187
22 Comparison of Attacks and Security Analyses for Different RFID Protocols
188
23 Honeypot Using Dynamic Allocation Technique with IP Scan
197
24 AttributeBased Encryption for Commercial Content Distribution
205
Part V IT Convergence Applications
214
25 Sensibility Extraction for Bicycle Design Using RFID TagAttached Crayons
215
26 Efficient Handover Schemes for Railroad Communications in 4G Mobile Networks
225
27 Cyber Threat Prediction Model Using Security Monitoring System Event
233
28 A Study for Car Insurance Service Using Vehicle Real Time Information
241
29 An MMU Virtualization for Embedded Systems
247
30 The Design and Implementation of Start Stop System with MultiProtocol in Automotive Smart Key System
253
31 The Design and Implementation of Improved AntiCollision Algorithm for Vehicle User Authentication System
260
32 MultiPort Register File Design and Implementation for the SIMD Programmable Shader
267
33 Design Exploration Technique for Software Component Mapping of AUTOSAR Development Methodology
273
34 Interoperability and Control Systems for Medical Cyber Physical Systems
282
35 Ubiquitous Logistics Management in the Steel Industry
293
36 Performance Evaluation of Train Propulsion Control on Ethernet Network Using TrueTime
301
37 Intelligent Control System for Railway Level Crossing Safety
308
38 Moving Average Estimator Least Mean Square Using Echo Cancellation Algorithm
319
39 An Abrupt Signal Detection as Accident Detection by Hamiltonian Eigenvalue on Highway CCTV Traffic Signal
325
40 Implementation of Improved DPD Algorithm Using the Approximation Hessian Technique and an Adaptive Filter
334
41 An InGaP HBT MMIC High Efficient Dual Path Power Amplifier for CDMA Handset Application
343
42 UHealth Platform for Health Management Service Based on Home Health Gateway
351
43 A 2D Visual Model for Sasang Constitution Classification Based on a Fuzzy Neural Network
357
44 Graph Coloring Algorithms and Applications to the Channel Assignment Problems
363
45 Thermal Performance in Ecological Korean House
371
46 An Automatic Roof Frame Design Method for Korean Traditional Wooden Architecture
377
47 Adaptive Load Partitioning Algorithm for Massively Multiplayer Online Games
383
48 GameBased Learning System Using GraduatedInterval Recall Method
393
49 An Efficient DRAM Converter for NonVolatile Based Main Memory
400
50 An M2MBased Interface Management Framework for Vehicles with Multiple Network Interfaces
409
51 A Framework of the Wireless Sensor Based Railway Signal System
417
52 Evolutionary BioInteraction Knowledge Accumulation for Smart Healthcare
424
53 A NonVolatile Buffered Main Memory Using PhaseChange RAM
433
54 A Study on the RealTime Location Tracking Systems Using Passive RFID
441
55 SmartKeyboard for the Disabled in Smartwork
449
56 Addressing the Outofdate Problem for Efficient Load Balancing Algorithm in P2P Systems
458
57 Unified Performance Authoring Tool for Heterogeneous Devices and Protocols
481
58 Discrimination System of Surround Illumination Using Photo Sensors Output Voltage Ratio
488
Computer Access Assessment System KCAAS for Persons with Physical Disabilities
499
60 Color Coding for Massive Bicycle Trajectories
508
61 UserOriented Load Balancing Scheme for MMORPG
515
A Single Interface Based File Sharing System
521
63 Feature Reduction and Noise Removal in SURF Framework for Efficient Object Recognition in Images
529
64 Automatic Segmentation of Region of Interests in MR Images Using Saliency Information and Active Contours
536
65 Digital Image Magnification Using GaussianEdge Directed Interpolation
545
Part VI Mobile Computing and Future Networks
553
66 An Examination of Psychological Factors Affecting Drivers Perceptions and Attitudes Toward Car Navigation Systems
555
67 Handover Performance Evaluation of 4G Mobile Networks
563
68 An Emergency Message Broadcasting Using Traffic Hazard Prediction for Vehicle Safety Communications on a Highway
568
69 Detecting SIM Box Fraud Using Neural Network
575
70 OverlappingNode Removal Algorithm Considering the Sensing Coverage of the Node in WSN
583
71 Implementation of the Personal Healthcare Services on Automotive Environments
589
72 A Design of WSN Model to Minimize DataCentric Routing Cost for ManytoMany Communication
597
73 Improving of Cache Performance using Trust Value of Nodes
605
74 Design of Microstrip Patch Antenna for Mobile Communication Systems Using SingleFeed
613
75 Microstrip Patch Antenna on UHF Band Using Multiple Meander for Metal Attached in UCity
622
84 Fast Data Acquisition with Mobile Device in Digital Crime
710
RemotetoRemote Transfer Protocols and Methods
719
86 The Stack Allocation Technique on Android OS
727
87 New Load Balancing Method for VoD Service
733
88 Exploiting MobilityTraffic Characteristics for PMIPv6Based Distributed Mobility Management
743
89 A MultihomingBased Vertical Handover Scheme
749
90 A Performance Prediction Model of Parallel DCT on Mobile Embedded Systems
755
91 Implementation of a Low Cost Home Energy Saver Based on OpenWrt
761
Part VII Multimedia and Information Visualization
766
92 A Multimedia Authoring and Virtual Collaboration System Supporting MultiConferences for ELearning
769
93 An Immersive Ski Game Based on a Simulator
777
94 A Method of Combining Gaussian Mixture Model and KMeans for Automatic Audio Segmentation of Popular Music
786
95 Human Action Classification and Unusual Action Recognition Algorithm for Intelligent Surveillance System
797
96 Design of Configurable Pin Control Block for Multimedia SystemonaChip
805
97 Depression and Fatigue Analysis Using a MentalPhysical Model
813
98 A Study of Nonphotorealistic Rendering Method Using Orientation Sensor in Mobile Devices
819
99 A BCI Contents Development Method Based Templates
828
100 PenInk Rendering for Traditional Building Images
837
101 ContextAware Statistical Inference System for Effective Object Recognition
842
102 Adaptive Skinny Smudge Tool
853
103 Modeling Students Handwritten Examination Data and Its Application Using a Tablet Computer
861
104 Advanced Media Measuring Method Using MPEG2 Transport Stream for High Quality Broadcasting Management System
866
105 Proposed Media Signal Sharing Scheme Through NGN for Service Overlay Multimedia Framework
873
106 Realtime Sport Analysis Methodology for Extracting Target Scenes on Mobile Environment
881
107 A Cost Effective Method for Matching the 3D Motion Trajectories
889
108 Perceived Quality Model for Supporting Full Session Mobility in Multimedia Service Delivery Process
896
109 A Study of Stereoscopic 3D Technology Development Trends on Mobile
905
110 Efficient Object Recognition Method for Adjacent CircularShape Objects
911
Part VIII Convergence Data Mining and Artificial Intelligence
918
111 Improved View Selection Algorithm in Data Warehouse
919
112 A Novel Weighting Technique for Mining Sequence Data Streams
929
113 Analyzing Efficient Algorithms of Frequent Pattern Mining
937
114 Efficient Isomorphic Decision for Mining Sub Graphs with a Cyclic Form
947
115 Performance Evaluation of Approximate Pattern Mining Based on Probabilistic and Statistical Techniques
957
116 Interactive SelfDiagnostic System Using Anatomical 3D Human Body
966
117 RuleBased Naive Bayesian Filtering for Personalized Recommend Service
977
118 Design of an Actigraphy Based Architecture for Mental Health Evaluation
984
119 Efficient Detection of Content Polluters in Social Networks
991
120 A Prototype Selection Algorithm Using Fuzzy kImportant Nearest Neighbor Method
997
121 Enhanced Reinforcement Learning by Recursive Updating of Qvalues for Reward Propagation
1003
122 Improved Method for Action Modeling Using Bayesian Probability Theory
1009
Korean National Health and Nutrition Examinations Survey V1
1014
124 Data MiningDriven Chronic Heart Disease for Clinical Decision Support System Architecture in Korea
1021
125 A Study on the Occurrence of Crimes Due to Climate Changes Using Decision Tree
1027
126 A Case Study for the Application of Storage Tiering Based on ILM through Data Value Analysis
1037
127 A Neural Network Mixture Model for Green Warranty Diffusion
1054
Part IX Web Technology and Software Engineering
1064
128 Generation of User Interest Ontology Using ID3 Algorithm in the Social Web
1065
129 Collective Intelligence Based Algorithm for Ranking Book Reviews
1075
130 Ranking Techniques for Finding Correlated Webpages
1085
131 SquareWave Like Performance Change Detection Using SPC Charts and ANFIS
1096
132 Hybrid Standard Platform for EJournal Usage Statistics Management
1105
133 Study for Predict of the Future Software Failure Time Using Nonlinear Regression
1117
134 Analysis of ThreatFactors for BiometricInformation Processing Systems According to GoalOriented Threat Modeling
1125
135 Distinct Element Method Analysis of Retaining Wall Using Steel Frame and Fill Material
1132
136 FullScaled Experiment for Behavior Investigation of Reinforced Concrete Columns with HighStrength Wire Ropes as Lateral Spiral Reinforcement
1139
137 Local Deformed Diameter Analysis of a Pipe in Rigid Encasement for Watercrossings Application
1147
138 A Study on Management System Design of Swimming Exercise Prescription by Using Fussy ANP
1156
139 Intelligent Recommendation System for Automotive Parts Assembly
1165
140 Model Transformation Verification Using Mapping Pattern and Model Transformation Similarity
1171
141 Hierarchical Analysis of Steel House Material for 3D
1179
142 MultiFaces Recognition Process
1185
143 Software Performance Test Automation by Using the Virtualization
1191
144 Requirement Analysis for AspectOriented System Development
1201
145 System Analysis and Modeling Using SysML
1210
Part X Green Convergence Services
1221
146 Handover Latency Reduction Scheme for Railroad Communications in 4G Mobile Networks
1223
REDOX Flow Battery
1230
148 An Effective Interfacing Adapter for PRAM Based Main Memory via Flexible Management DRAM Buffer
1237
IT Convergence and Security 2012
1243
Copyright

Overige edities - Alles weergeven

Veelvoorkomende woorden en zinsdelen

Over de auteur (2012)

Kuinam J. Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. Professor Kim received Ph.D degree in Industrial Engineering from the Colorado State University. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has been Principal Investigator of several multimillion dollar projects funded by government agencies. The projects include Center for Industry Security, funded by Ministry of Knowledge and Economy Korea, Active Security Mechanism based on Active Networking technique funded by Agency for Defense Development, Total Information Security Development for The Execution of the Future War funded by Ministry of National Defense Korea, Development of Knowledge Platform funded by Electronics and Telecommunications Research Institute. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic).

Bibliografische gegevens