𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Science and its Applications: Ubiquitous Information Technologies

✍ Scribed by James J. (Jong Hyuk) Park, Ivan Stojmenovic, Hwa Young Jeong, Gangman Yi (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2015
Tongue
English
Leaves
1395
Series
Lecture Notes in Electrical Engineering 330
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The 6th FTRA International Conference on Computer Science and its Applications (CSA-14) will be held in Guam, USA, Dec. 17 - 19, 2014. CSA-14 presents a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application.

✦ Table of Contents


Front Matter....Pages 1-36
Maneuvering Target Tracking Algorithm for Adaptive Estimation on Measurement Noise Variance Matrix....Pages 1-6
Performance of a Hybrid DCT SVD Visually Imperceptible Digital WatermarkingΒ  against Signal Processing Attacks....Pages 7-14
A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman Filter....Pages 15-20
Proposal for Easily Detachable Proxy for Personal Information Leakage Detection....Pages 21-27
Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices....Pages 29-34
The Improved 16th-Order Differential Attack on 10- Round Variant of Block Cipher PRESENT....Pages 35-40
Implementation of Stereo Camera Module for Hand Gesture Recognition....Pages 41-46
Social Network Recommendation Based on Hybrid Suffix Tree Clustering....Pages 47-53
A Reputation-Based Adaptive Trust Management System for Vehicular Clouds....Pages 55-64
Semi-automatic Construction of a Named Entity Dictionary Based on Active Learning....Pages 65-70
Research on Privacy Protection of WHOIS Information in DNS....Pages 71-76
Fuzzy Logic-Driven Resource Evaluation Method for Automated Negotiation with Resource Allocation in Distributed Environment....Pages 77-82
ERAGHC: Enhanced Reliable Authenticated Group Head Communication....Pages 83-92
Transaction Authentication Using HMAC-Based One-Time Password and QR Code....Pages 93-98
New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme....Pages 99-106
Secrecy Multiplication Based on a (k, n)-Threshold Secret-Sharing Scheme Using Only k Servers....Pages 107-112
Hierarchical-Structured Key Exchange Scheme for Large-Scale Mesh-Type Wireless Sensor Networks....Pages 113-120
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning....Pages 121-126
A Multimodal Sensing System for Elder Fall Detection....Pages 127-134
A Study on ENC Data Translation for Mobile Device....Pages 135-140
Exploring Tactics in Team Sports Training....Pages 141-148
Adaptive CAP Assignment Approach for IEEE 802.15.3c....Pages 149-154
Content Awareness-Based Fast Block Motion Estimation Algorithm for H.264/AVC Encoding System....Pages 155-161
Real-Time Projection Mapping for Performance Arts....Pages 163-169
Ranking Method for Book Reviews Based on Estimated Discussion Quality....Pages 171-177
Mining Frequent Graph Patterns Considering Both Different Importance and Rarity of Graph Elements....Pages 179-184
Vehicle Data Generating Technique Considering Vehicles with Incrementally Changing States Based on Growth and Decline Functions....Pages 185-190
Correlated Blog-Page Retrieval with Structural Characteristics....Pages 191-196
A Topic-Oriented Information Retrieval Algorithm in the Blogosphere....Pages 197-202
Fast HEVC Intra Mode Decision Based on Bayesian Classification Framework with Relative SATD....Pages 203-209
Best Practices in Software Engineering for SaaS-Cloud Era....Pages 211-216
The Effects of Mental Model on Intention to Use Smartphone Applications....Pages 217-222
A Trie-Based Approach to Fast and Scalable Flow Recognition for OpenFlow....Pages 223-230
Accelerate Packet Classification Using GPU: A Case Study on HiCuts....Pages 231-238
Time Division Broadcasting Scheme for Congestion Control in Vehicle-to-Vehicle Communication....Pages 239-244
Approximating Dependency for Efficient Multi-label Feature Selection....Pages 245-250
Investigating Relation of Music Data: Emotion and Audio Signals....Pages 251-256
An Approach to Develop Architecture of ARINC653-Based Avionic Software....Pages 257-262
Personal Information Access Control Scheme for Secure NFC Integrated Payment....Pages 263-268
Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor Management....Pages 269-274
EEG Analysis by Pupil Movements....Pages 275-280
Enhanced Direct Mode Coding for Bi-predictive Pictures....Pages 281-286
Error Resilient Dual Frame Motion Compensation with Uneven Quality Protection....Pages 287-292
Multi-view with Extended Dual Frame Motion Compensation....Pages 293-298
The Method of Estimating of Frequency of the Harmonic Trend in Measuring Signal....Pages 299-304
Discrete-Analog Haar Wavelet Filter for Real Time Applications....Pages 305-310
Hardware Architecture for Real-Time Face Detection on Embedded Analog Video Cameras....Pages 311-316
The Issue of Data Transfer for the Embedded SE on Mobile Devices....Pages 317-322
Ways of Improving the Acoustic-Emission Method of Investigation of Properties of Ceramic Materials....Pages 323-327
Experience in Application of New Methods for Analyzing the Properties of Acoustic Emission Ceramic Materials and Products....Pages 329-333
Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle Communications....Pages 335-341
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems....Pages 343-348
Robust Control for Multimedia TCP/AQM Flows Case Study....Pages 349-354
The Effects of Multiple Scattering on Performance of Ballistic Channel Strained-Si Diodes....Pages 355-360
Texture Extraction from Video and Image Warping for AR Coloring Book * ....Pages 361-365
Framework for Evaluation of Information Systems Utilization and Its Application in the ROK-MND....Pages 367-372
Compensation of Directional and Rotational Mismatch of Separate Stereo Cameras by Vanishing Point and Lines....Pages 373-378
Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment....Pages 379-384
Design for Most Compatible Booting Model of Integrated Memory-Disk Based on ARM Linux....Pages 385-390
Designing a Smart Multisensor Framework Based on Beaglebone Black Board....Pages 391-397
Calculation of CO2 Exhausting Volumes by EMME/3 Program Simulation....Pages 399-404
Implementing a Touch Projection System That Is Not Dependent on Sensor Position....Pages 405-410
Secure Filesystem for Trusted Virtual Domain in Mobile Device....Pages 411-417
A Middleware for Developing Context-Aware Mobile Applications in Low-Cost Acquisition Devices....Pages 419-424
Personalized Information Gathering Using Implicit User Feedback in a Multiple Personal Device Environment....Pages 425-435
Rich-Media Technologies and Their Using in Crisis Management Communication....Pages 437-442
Effective Purchase Pattern Mining with Weight Based on FRAT Analysis for Recommender in e-Commerce....Pages 443-454
Voice Control of Technical Functions in Smart Home with KNX Technology....Pages 455-462
Development of IR MEMS Sensor Connected to Smart Phone via Earphone Jack....Pages 463-468
Implementation of a Conditional Searchable Encryption System for Data Storage....Pages 469-474
Formal Specification of Malware Models in the Form of Colored Petri Nets....Pages 475-482
Semantic Description of the Context of the Service Call....Pages 483-489
Automatic Identification of Spatio-temporal Highway Congestion Patterns Using Historic Database....Pages 491-498
Definition of Attack in the Context of Low-Level Interaction Server Honeypots....Pages 499-504
Practical Biometrics On-Card Matching for Remote User Authentication Using Smart Cards....Pages 505-510
Quantifying Overt Hardware Attacks: Using ART Schema....Pages 511-516
Linear and Differential Properties of Randomly Generated DES-Like Substitution Boxes....Pages 517-524
Modelling of APGAS Programming Systems with Using of P/T Petri Process Nets....Pages 525-532
A Semantic Social Bookmarking System Based on a Wiki-Like Approach....Pages 533-538
A Kanban-Based Methodology to Define Taxonomies and Folksonomies in KMS....Pages 539-544
Research on Development Stage of Service Model in Big Data Industry....Pages 545-554
Robust link-oriented Routing Protocol (ROR) for Vehicular Ad Hoc Networks....Pages 555-565
Wireless Chest-Based ECG Biometrics....Pages 567-579
Development of a Visualisation Software, Implemented with Comfort Smart Home Wireless Control System....Pages 581-589
De-word Classification Algorithm Based on the Electric Power of Large Data Library Retrieval....Pages 591-602
Development of an HMI Evaluation Tool Supporting Test of Interaction with IoT-Based Systems....Pages 603-614
Multi-Focus Image Fusion by Using a Pixel-Based SML Comparison Map....Pages 615-621
Performance Analysis of Matching Cost for Stereo Matching with CUDA....Pages 623-629
Application Research of University Decision Support System Based on Data Warehouse....Pages 631-637
A Rapid Development Framework of Enterprise Information System Based on Components and JavaEE....Pages 639-645
DynamoRIO-Based Malware Detection System under 10G Network Environment....Pages 647-653
Category-Based an Intelligent Search System Using a Variety of Recommendation Data....Pages 655-660
Efficient Evaluation of Window Join Aggregates in Data Stream Processing....Pages 661-667
Cost Analysis of Time-Slide Window Joins....Pages 669-675
TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication Systems....Pages 677-682
A Testing and Treatment System Model for Unilateral Neglect Patient Based on Visual Feedback Training....Pages 683-689
Security Issues on Smarthome in IoT Environment....Pages 691-696
Extraction of Object Position Information Using the Natural Image Marker....Pages 697-704
Energy-Aware GPU-RAID Scheduling for Reducing Energy Consumption in Cloud Storage Systems....Pages 705-711
Meanshift Segmentation Guided Spatially Adaptive Histogram Equalization....Pages 713-718
Three-Dimensional Target Recognition Under Photon-Starved Conditions Using Photon Counting Axially Distributed Sensing and Nonlinear Correlation....Pages 719-723
Cache View Based Top-k Query Processing for Encrypted Data Analysis....Pages 725-730
Interactive Mobile Learning Environment for Processing Computational Science Simulation Task....Pages 731-735
An Optimal Recovery Time Method in Cloud Computing....Pages 737-745
Design of Interaction Coordination in Electric Vehicle Information Service Frameworks....Pages 747-750
Tag Interference Based Mobile Object Tracking with Passive UHF RFID System....Pages 751-757
Privacy Protection of Medical Imagery Using Reversible Watermarking....Pages 759-764
A Flexible Page Storage Model for Mixed OLAP and OLTP Workloads....Pages 765-770
Cooperative Communication Protocol Based on EDCA in IEEE 802.11e WLANs....Pages 771-776
Data Processing Framework for Electric Vehicle-Generated Streams Using Hadoop....Pages 777-781
Efficient Indexing for OLAP Query Processing with MapReduce....Pages 783-788
Exploring Millennial Generation Behavior of Gamification Contents Converging with ICT and Sharing Economy: Hierarchical Clustering Analysis....Pages 789-794
A Study of Burst Transfer Generation....Pages 795-802
Mitigation of Selfish Carrier-Sense Behavior in Wi-Fi Networks....Pages 803-808
The Real-Time Monitoring System of Social Big Data for Disaster Management....Pages 809-815
MAST: Multi-Level Associated Sector Translation for NAND Flash Memory-Based Storage System....Pages 817-822
Remote-Launch: Borrowing Secure TCB for Constructing Trustworthy Computing Platform....Pages 823-829
Human Action Recognition Using Product Manifold Theory and Procrustes Shape Analysis....Pages 831-836
Zombie PC Detection and Treatment Model on Software-Defined Network....Pages 837-843
Design and Implementation of System for Assets and Insolvency Prediction Applied to Industries Based on AHP and Forensic Readiness....Pages 845-850
Profiling-Based Energy-Aware Recommendation System for Cloud Platforms....Pages 851-859
Path Information Based Packet Verification for Authentication of SDN Network Manager....Pages 861-866
Detection Methods for Disaster by Lexical Patterns....Pages 867-873
GUI Programming Scheme for Low Storage Usage in Lightweight Computing Environment....Pages 875-881
The Right to be Forgotten: Standard on Deleting the Exposed Personal Information on the Internet....Pages 883-889
Position Estimation of Multiple Light Sources for Augmented Reality....Pages 891-897
A Testing Method for AUTOSAR Software Components Using Virtual Prototyping by Modification of OSEK Operating System....Pages 899-905
A Compensation-Based Cooperative Mechanism to Improve the Performance of IEEE 802.11 WLANs....Pages 907-912
RUDP Design and Implementation Using OPNET Simulation....Pages 913-919
Provisioning Virtual Infrastructure to Cloud Service Consumer in Perspective of Brokering VM Placement....Pages 921-926
Method of Graph Node Fusion and Its Application on Bus Information Systems....Pages 927-931
Tracking Model for Abnormal Behavior from Multiple Network CCTV Using the Kalman Filter....Pages 933-939
Application Authentication and Secure Key Management Scheme Using MTM....Pages 941-946
Energy Saving Mechanism for Web Services....Pages 947-952
Awareness Home Automation System Based on User Behavior through Mobile Sensing....Pages 953-959
A Brokering Service Design for Vehicle-To-Grid Electricity Trades....Pages 961-965
Fractional Frequency Reuse (FFR) Based Overlap Resource Power Control for Interference Mitigation in an LTE-Advanced Network with Device-to-Device Communication....Pages 967-973
A Repeated Non-Cooperative Game Theoretic Approach to Energy-Efficiency of Cellular Networks....Pages 975-981
On QoS Provisioning Based on User Mobility Patterns for Proxy Mobile IPv6 Networks....Pages 983-989
Design of an Android App for Gyeongju Smart Tourism....Pages 991-995
IO Cost Evaluation of OLAP Query Processing with MapReduce....Pages 997-1002
A Two-Layer Cluster Head Selection Based on Distance in Wireless Sensor Networks....Pages 1003-1007
The Dynamic Group Authentication Scheme for P2P Based Mobile Commerce....Pages 1009-1015
Stable HPC Cluster Management Scheme through Performance Evaluation....Pages 1017-1023
Effects on Mapping the VCPUs to the Physical CPUs in Para-Virtualization....Pages 1025-1029
Development of Teaching-Learning Model with Project-Based Learning Using Smart Learning Contents Authoring Tool....Pages 1031-1036
Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications....Pages 1037-1042
Smart Emergency Rescue System Based on Biometric Authentication....Pages 1043-1048
A Study on Diffusion Dynamics of Intelligence-Driven Cloud Solutions in Law Enforcement Authorities....Pages 1049-1054
A Structural Synthesis of Information Computer Networks of Automated Control Systems Based on Genetic Algorithms....Pages 1055-1063
A Music Recommendation Method with Emotion Recognition Using Ranked Attributes....Pages 1065-1070
Research of Object Recognition and Tracking Based on Feature Matching....Pages 1071-1076
Test-Sheet Composition Using Genetic Algorithm for Controlling Item Exposure....Pages 1077-1083
The Implementation of Defect Detector Using Efficient Thresholding Method....Pages 1085-1091
Evaluation of the Synchronous Mobile Learning System Supporting Tablets for Instructor and Student....Pages 1093-1099
On Designing an Effective Training Set for Information Extraction....Pages 1101-1107
Application of SNS for a Satisfaction Analysis of School Meals....Pages 1109-1115
Real-Time Vision Based Camera Moving and Displacement Detection Algorithm....Pages 1117-1122
Prescriptive Analytics for Planning Research-Performance Strategy....Pages 1123-1129
XOnto-Apriori: An Effective Association Rule Mining Algorithm for Personalized Recommendation Systems....Pages 1131-1138
MapReduce-Based Bulk-Loading Algorithm for Fast Search for Billions of Triples....Pages 1139-1145
Inspecting Retrieval Engines Based on Term’s Weight....Pages 1147-1152
An Enhanced Signal-Driven PMIPv6 for Distributed Mobility Control....Pages 1153-1158
Unconstrained Continuous Infants Monitoring System Based on Mattress-Type Force Sensing Platform: A Pilot Study....Pages 1159-1166
Preliminary Study for Driver’s Posture Correction Support System Based on Seat-Embedded Pressure Sensing Platform....Pages 1167-1174
A Congestion Degree Index Based Bandwidth Estimation Method Using Pair Packet Delay....Pages 1175-1180
International Research Networking of KRLight Supporting Data-Intensive Science....Pages 1181-1188
Design of National Research Network for Strengthening of Supporting an Advanced Research Activities....Pages 1189-1193
Deployment Status of Global and Domestic WiFi Roaming Technology in Korea....Pages 1195-1200
Analysis on Study Trend and Technical Feature of Software-Defined Networking....Pages 1201-1208
Design and Construction of Sinknet for KREONET Attack Detection....Pages 1209-1214
Depth Image Based System for Notifying Human Keeping Appropriate Distance from Screen - Implement....Pages 1215-1224
A Framework for Continuous Real-Time Collaborative Editing....Pages 1225-1232
A Robust Faint Situation Recognition and Response System Based on Object Tracking Algorithms Using Thermal Camera....Pages 1233-1243
Strong Identification and Authentication Using Dynamic Biometric Signature....Pages 1245-1252
An Implementation of Automatic Software Testing on Cloud Computing Environment....Pages 1253-1259
Exchangeable Humanoid Animation Using H-Anim and Motion Capture Data....Pages 1261-1270
Wearable Computing Connecting Gas Sensor to Detector Harmful Air - Implement....Pages 1271-1280
The Non-linear Relationship between Economic and Life Insurance Development in Asia: A Panel Threshold Regression Analysis....Pages 1281-1290
Comparative Study of Singing Voice Detection Methods....Pages 1291-1298
A Feature Selection Technique for Hand Gesture Recognition in Music Display System....Pages 1299-1305
An Approach for Applying Social Networks Information to Information Recommendation....Pages 1307-1314
Preference Measurement Using User Response Electroencephalogram....Pages 1315-1324
Development of ISMEE: An Information Security Management Engineering Environment....Pages 1325-1330
Usefulness of ISMEE for Supporting Organizations with ISMSs....Pages 1331-1336
Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT Attack....Pages 1337-1343
A Model for a Physical and Virtual Environment for Extreme Feedback in the Development of the Metacognition Supported by TICS: The Computer Engineer Career as Case of Study....Pages 1345-1352
Predicting New Attacks for Information Security....Pages 1353-1358
A Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045....Pages 1359-1366
Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks....Pages 1367-1375
A MapReduce-Based Algorithm for Nearest Neighbor Search with Keywords....Pages 1377-1384
A Method for Distinguishing between Shopper’s Intentions: Whether Their Purchase Is β€œPlanned Buying” or β€œImpulse Buying” Utilizing the Shopper’s Behavior Process Model....Pages 1385-1394
A New Antenna Selection Algorithm for Indoor Distributed Antenna Systems Environment....Pages 1395-1400
An Emotion Assessment Method Based on Supported Vector Data Description....Pages 1401-1406
Improved Mean Representation Based Classification for Face Recognition....Pages 1407-1412
Functional Considerations in Military-Grade Security Platform Using a Mobile Hypervisor....Pages 1413-1418
Back Matter....Pages 1419-1425

✦ Subjects


Communications Engineering, Networks; Computer Systems Organization and Communication Networks; Information Systems and Communication Service


πŸ“œ SIMILAR VOLUMES


Ubiquitous Information Technologies and
✍ Ozgur Koray Sahingoz (auth.), Youn-Hee Han, Doo-Soon Park, Weijia Jia, Sang-Soo πŸ“‚ Library πŸ“… 2013 πŸ› Springer Netherlands 🌐 English

<p>Recent advances in electronic and computer technologies have paved the way for the proliferation of ubiquitous computing and innovative applications that incorporate these technologies. This proceedings book describes these new and innovative technologies, and covers topics like Ubiquitous Commun

Ubiquitous Information Technologies and
✍ Junghoon Lee, Gyung-Leen Park, Byung-Jun Lee (auth.), Young-Sik Jeong, Young-Ho πŸ“‚ Library πŸ“… 2014 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>The theme of CUTE is focused on the various aspects of ubiquitous computing for advances in ubiquitous computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ubiquitous computing. Therefore this book will be include t

Ubiquitous Information Technologies and
✍ Ozgur Koray Sahingoz (auth.), Youn-Hee Han, Doo-Soon Park, Weijia Jia, Sang-Soo πŸ“‚ Library πŸ“… 2013 πŸ› Springer Netherlands 🌐 English

<p>Recent advances in electronic and computer technologies have paved the way for the proliferation of ubiquitous computing and innovative applications that incorporate these technologies. This proceedings book describes these new and innovative technologies, and covers topics like Ubiquitous Commun

Auto-identification and ubiquitous compu
✍ Judith Symonds, Judith Symonds, John Ayoade, Dave Parry πŸ“‚ Library πŸ“… 2009 πŸ› Information Science Reference 🌐 English

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. <p><b>Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary

Data Management Technologies and Applica
✍ Alfredo Cuzzocrea (editor), Oleg Gusikhin (editor), Slimane Hammoudi (editor), C πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book constitutes the refereed post-proceedings of the 10th International Conference and 11th International Conference on Data Management Technologies and Applications, DATA 2021 and DATA 2022, was held virtually due to the COVID-19 crisis on July 6–8, 2021 and in Lisbon, Portugal on Ju

Information Technologies and Mathematica
✍ Alexander Dudin (editor), Anatoly Nazarov (editor), Alexander Moiseev (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book constitutes revised selected papers of the 20th International Conference on Information Technologies and Mathematical Modelling, ITMM 2021, named after A.F. Terpugov, held in Tomsk, Russia, in December 2021. Due to the COVID-19 pandemic the conference was held in a virtual mode. </sp