Amazon cover image
Image from Amazon.com

Advances in computer science and information technology : AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23-25, 2010 ; joint proceedings / Tai-hoon Kimm, Hojjat Adeli (eds.).

By: (2nd : International e-Conference on Advanced Science and Technology (2nd : 2010 : Miyazaki, Japan)Contributor(s): Kim, Tai-hoon | Adeli, Hojjat, 1950- | International Conference on Advanced Communication and Networking (2nd : 2010 : Miyazaki, Japan) | International Conference on Information Security and Assurance (4th : 2010 : Miyazaki, Japan) | UCMA (Conference) (2010 : Miyazaki, Japan)Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 6059.Publication details: Berlin : Springer, 2010. Description: 1 online resource (xi, 604 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642135774; 3642135773Other title: AST/UCMA/ISA/ACN 2010 | AST | UCMA | ISA | ACNSubject(s): Computer networks -- Congresses | Multimedia systems -- Congresses | Ubiquitous computing -- Congresses | Computing Methodologies | Réseaux d'ordinateurs -- Congrès | Multimédia -- Congrès | Informatique | Computer networks | Multimedia systems | Ubiquitous computing | Informationstechnik | Informationssystem | Anwendungssystem | Kryptoanalyse | Biometrie | Datensicherung | Computersicherheit | Miyazaki <2010>Genre/Form: Congress | Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Advances in computer science and information technology.DDC classification: 004.6 LOC classification: TK5105.5 | .I58 2010NLM classification: TK5105.5Online resources: Click here to access online
Contents:
Information security and assurance. Fuzzy based threat analysis in Total Hospital Information System / Nurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail, and Azizah Abdul Manaf -- An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model / Bo Zhang and Qiuliang Xu -- A supervised locality preserving projections based local matching algorithm for face recognition / Yingqi Li, Cheng Lu, Miao Qi, and Shuyan Wang -- Information systems security criticality and assurance evaluation / Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, and Djamel Khadraoui -- Security analysis of 'two-factor user authentication in wireless sensor networks' / Muhammad Khurram Khan and Khaled Alghathbar -- Directed graph pattern synthesis in LSB technique on video steganography / Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, and Tai-hoon Kim -- Feature level fusion of face and palmprint biometrics by isomorphic graph-based improvement K-medoids partitioning / Dakshina Ranjan Kisku, Phalguni Gupta, and Jamuna Kanta Sing -- Post-quantum cryptography : code-based signatures / Pierre-Louis Cayrel and Mohammed Meziani -- Security analysis of the proposed practical security mechanisms for high speed data transfer protocol / Danilo Valeros Bernardo and Doan Hoang -- A fuzzy-based dynamic provision approach for virtualized network intrusion detection systems / Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, and Wantao Liu -- An active intrusion detection system for LAN specific attacks / Neminath Hubballi, S. Roopa, Ritesh Ratti, F.A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, and Vivek Ramachandran -- Analysis on the improved SVD-based watermarking scheme / Huo-Chong Ling, Raphael C-W. Phan, and Swee-Huay Heng -- Advanced communication and networking. Applications of adaptive belief propagation decoding for long Reed-Solomon codes / Zhian Zheng, Dang Hai Pham, and Tomohisa Wada -- Dynamic routing for mitigating the energy hole based on heuristic mobile sink in wireless sensor networks / Seong-Yong Choi, Jin-Su Kim, Seung-Jin Han, Jun-Hyeog Choi, Kee-Wook Rim, and Jung-Hyun Lee -- Grammar encoding in DNA-like secret sharing infrastructure / Marek R. Ogiela and Urszula Ogiela -- HATS : high accuracy timestamping system based on NetFPGA / Zhiquiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, and Xing Li -- A roadside unit placement scheme for vehicular telematics networks / Junghoon Lee and Cheol Min Kim -- Concurrent covert communication channels / Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud, and Yoojin Chung -- Energy efficiency of collaborative communication with imperfect frequency synchronization in wireless sensor networks / Husnain Naqvi, Stevan Berber, and Zoran Salcic -- High performance MAC architecture for 3GPP modem / Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, and Kyungho Kim -- Modified structures of Viterbi algorithm for forced-state method in concatenated coding system of ISDB-T / Zhian Zheng, Yoshitomo Kaneda, Dang Hai Pham, and Tomohisa Wada -- A new cross-layer unstructured P2P file sharing protocol over mobile ad hoc network / Nadir Shah and Depei Qian -- A model for interference on links in inter-working multi-hop wireless networks / Oladayo Salami, Antoine Bagula, and H. Anthony Chan -- An optimum ICA based multiuser data separation for short message service / Mahdi Khosravy, Mohammad Reza Alsharif, and Katsumi Yamashita -- Advanced computer science and information technology. Multiple asynchronous requests on a client-based mashup page / Eunjung Lee and Kyung-Jin Seo -- Using an integrated ontology database to categorize web pages / Rujiang Bai, Xiaoyue Wang, and Junhua Liao -- Topic detection by topic model induced distance using biased initiation / Yonghui Wu, Yuxin Ding, Xiaolong Wang, and Jun Xu -- Mining significant least association rules using fast SLP-Growth algorithm / Zailani Abdullah, Tutut Herawan, and Mustafa Mat Deris -- Maximized posteriori attributes selection from facial salient landmarks for face recognition / Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, and Massimo Tistarelli -- Agent based approach to regression testing / Praveen Ranjan Srivastava and Tai-hoon Kim -- A numerical study on B & B algorithms for solving sum-of-ratios problem / Lianbo Gao and Jianming Shi -- Development of a digital textbook standard format based on XML / Mihye Kim, Kwan-Hee Yoo, Chan Park, and Jae-Soo Yoo -- A pattern-based representation approach for online discourses / Hao Xu -- A fault tolerant architecture for transportation information services of e-government / Woonsuk Suh, Boo-Mann Choung, and Eunseok Lee -- Design and implementation of binary tree based proactive routing protocols for large MANETS / Pavan Kumar Pandey and G.P. Biswas -- Extract semantic information from WordNet to improve text classification performance / Rujiang Bai, Xiaoyue Wang, and Junhua Liao -- Managing ubiquitous scientific knowledge on Semantic Web / Hao Xu -- A semantic pattern approach to managing scientific publications / Hao Xu -- A bootstrap software reliability assessment method to squeeze out remaining faults / Mitsuhiro Kimura and Takaji Fujiwara -- Markov chain Monte Carlo random testing / Bo Zhou, Hiroyuki Okamura, and Tadashi Dohi -- An integrated approach to detect fault-prone modules using complexity and text feature metrics / Osamu Mizuno and Hideaki Hata -- Ubiquitous computing and multimedia applications. An effective video steganography method for biometric identification / Yingqi Lu, Cheng Lu, and Miao Qi -- A video coding technique using octagonal motion search and BTC-PF method for fast reconstruction / Bibhas Chandra Dhara, Sanjoy Kumar Saha, and Bhabatosh Chanda -- Rough set approach in ultrasound biomicroscopy glaucoma analysis / Soumya Banerjee, Hameed Al-Qaheri, El-Sayed A. El-Dahshan, and Aboul Ella Hassanien -- Video copy detection : sequence matching using hypothesis test / Debabrata Dutta, Sanjoy Kumar Saha, and Bhabatosh Chanda -- An XML-based digital textbook and its educational effectiveness / Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo, Hoseung Byun, Wanyoung Cho, Jeeheon Ryu, and Namgyun Kim -- SIMACT : a 3D open source smart home simulator for activity recognition / Kevin Bouchard, Amir Ajroud, Bruno Bouchard, and Abdenour Bouzouane -- Design of an efficient message collecting scheme for the slot-based wireless mesh network / Junghoon Lee and Gyung-Leen Park -- A novel approach based on fault tolerance and recursive segmentation to query by humming / Xiaohong Yang, Qingcai Chen, and Xiaolong Wang -- Chinese prosody generation based on C-ToBI representation for text-to-speech / Byeongchang Kim -- CAS4UA : a context-aware service system based on workflow model for ubiquitous agriculture / Yongyun Cho, Hyun Yoe, and Haeng-Kon Kim -- A power control scheme for an energy-efficient MAC protocol / Ho-chul Lee, Jeong-hwan Hwang, Meong-hun Lee, Haeng-kon Kim, and Hyun Yoe -- Towards the designing of a robust intrusion detection system through an optimized advancement of neural networks / Iftikhar Ahmad, Azween B Abdulah, and Abdullah S Alghamdi.
Summary: Annotation This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June 2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry professionals to catch up on recent progress in the related areas. The 49 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and improvement from more than 1000 initial submissions. The papers emanate from the four following international conferences: Information Security and Assurance (ISA 2010), Advanced Communication and Networking (ACN 2010), Advanced Science and Technology (AST 2010), and Ubiquitous Computing and Multimedia Applications (UCMA 2010). This volume focuses on various aspects of advance.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references.

Information security and assurance. Fuzzy based threat analysis in Total Hospital Information System / Nurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail, and Azizah Abdul Manaf -- An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model / Bo Zhang and Qiuliang Xu -- A supervised locality preserving projections based local matching algorithm for face recognition / Yingqi Li, Cheng Lu, Miao Qi, and Shuyan Wang -- Information systems security criticality and assurance evaluation / Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, and Djamel Khadraoui -- Security analysis of 'two-factor user authentication in wireless sensor networks' / Muhammad Khurram Khan and Khaled Alghathbar -- Directed graph pattern synthesis in LSB technique on video steganography / Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, and Tai-hoon Kim -- Feature level fusion of face and palmprint biometrics by isomorphic graph-based improvement K-medoids partitioning / Dakshina Ranjan Kisku, Phalguni Gupta, and Jamuna Kanta Sing -- Post-quantum cryptography : code-based signatures / Pierre-Louis Cayrel and Mohammed Meziani -- Security analysis of the proposed practical security mechanisms for high speed data transfer protocol / Danilo Valeros Bernardo and Doan Hoang -- A fuzzy-based dynamic provision approach for virtualized network intrusion detection systems / Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, and Wantao Liu -- An active intrusion detection system for LAN specific attacks / Neminath Hubballi, S. Roopa, Ritesh Ratti, F.A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, and Vivek Ramachandran -- Analysis on the improved SVD-based watermarking scheme / Huo-Chong Ling, Raphael C-W. Phan, and Swee-Huay Heng -- Advanced communication and networking. Applications of adaptive belief propagation decoding for long Reed-Solomon codes / Zhian Zheng, Dang Hai Pham, and Tomohisa Wada -- Dynamic routing for mitigating the energy hole based on heuristic mobile sink in wireless sensor networks / Seong-Yong Choi, Jin-Su Kim, Seung-Jin Han, Jun-Hyeog Choi, Kee-Wook Rim, and Jung-Hyun Lee -- Grammar encoding in DNA-like secret sharing infrastructure / Marek R. Ogiela and Urszula Ogiela -- HATS : high accuracy timestamping system based on NetFPGA / Zhiquiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, and Xing Li -- A roadside unit placement scheme for vehicular telematics networks / Junghoon Lee and Cheol Min Kim -- Concurrent covert communication channels / Md Amiruzzaman, Hassan Peyravi, M. Abdullah-Al-Wadud, and Yoojin Chung -- Energy efficiency of collaborative communication with imperfect frequency synchronization in wireless sensor networks / Husnain Naqvi, Stevan Berber, and Zoran Salcic -- High performance MAC architecture for 3GPP modem / Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, and Kyungho Kim -- Modified structures of Viterbi algorithm for forced-state method in concatenated coding system of ISDB-T / Zhian Zheng, Yoshitomo Kaneda, Dang Hai Pham, and Tomohisa Wada -- A new cross-layer unstructured P2P file sharing protocol over mobile ad hoc network / Nadir Shah and Depei Qian -- A model for interference on links in inter-working multi-hop wireless networks / Oladayo Salami, Antoine Bagula, and H. Anthony Chan -- An optimum ICA based multiuser data separation for short message service / Mahdi Khosravy, Mohammad Reza Alsharif, and Katsumi Yamashita -- Advanced computer science and information technology. Multiple asynchronous requests on a client-based mashup page / Eunjung Lee and Kyung-Jin Seo -- Using an integrated ontology database to categorize web pages / Rujiang Bai, Xiaoyue Wang, and Junhua Liao -- Topic detection by topic model induced distance using biased initiation / Yonghui Wu, Yuxin Ding, Xiaolong Wang, and Jun Xu -- Mining significant least association rules using fast SLP-Growth algorithm / Zailani Abdullah, Tutut Herawan, and Mustafa Mat Deris -- Maximized posteriori attributes selection from facial salient landmarks for face recognition / Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, and Massimo Tistarelli -- Agent based approach to regression testing / Praveen Ranjan Srivastava and Tai-hoon Kim -- A numerical study on B & B algorithms for solving sum-of-ratios problem / Lianbo Gao and Jianming Shi -- Development of a digital textbook standard format based on XML / Mihye Kim, Kwan-Hee Yoo, Chan Park, and Jae-Soo Yoo -- A pattern-based representation approach for online discourses / Hao Xu -- A fault tolerant architecture for transportation information services of e-government / Woonsuk Suh, Boo-Mann Choung, and Eunseok Lee -- Design and implementation of binary tree based proactive routing protocols for large MANETS / Pavan Kumar Pandey and G.P. Biswas -- Extract semantic information from WordNet to improve text classification performance / Rujiang Bai, Xiaoyue Wang, and Junhua Liao -- Managing ubiquitous scientific knowledge on Semantic Web / Hao Xu -- A semantic pattern approach to managing scientific publications / Hao Xu -- A bootstrap software reliability assessment method to squeeze out remaining faults / Mitsuhiro Kimura and Takaji Fujiwara -- Markov chain Monte Carlo random testing / Bo Zhou, Hiroyuki Okamura, and Tadashi Dohi -- An integrated approach to detect fault-prone modules using complexity and text feature metrics / Osamu Mizuno and Hideaki Hata -- Ubiquitous computing and multimedia applications. An effective video steganography method for biometric identification / Yingqi Lu, Cheng Lu, and Miao Qi -- A video coding technique using octagonal motion search and BTC-PF method for fast reconstruction / Bibhas Chandra Dhara, Sanjoy Kumar Saha, and Bhabatosh Chanda -- Rough set approach in ultrasound biomicroscopy glaucoma analysis / Soumya Banerjee, Hameed Al-Qaheri, El-Sayed A. El-Dahshan, and Aboul Ella Hassanien -- Video copy detection : sequence matching using hypothesis test / Debabrata Dutta, Sanjoy Kumar Saha, and Bhabatosh Chanda -- An XML-based digital textbook and its educational effectiveness / Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo, Hoseung Byun, Wanyoung Cho, Jeeheon Ryu, and Namgyun Kim -- SIMACT : a 3D open source smart home simulator for activity recognition / Kevin Bouchard, Amir Ajroud, Bruno Bouchard, and Abdenour Bouzouane -- Design of an efficient message collecting scheme for the slot-based wireless mesh network / Junghoon Lee and Gyung-Leen Park -- A novel approach based on fault tolerance and recursive segmentation to query by humming / Xiaohong Yang, Qingcai Chen, and Xiaolong Wang -- Chinese prosody generation based on C-ToBI representation for text-to-speech / Byeongchang Kim -- CAS4UA : a context-aware service system based on workflow model for ubiquitous agriculture / Yongyun Cho, Hyun Yoe, and Haeng-Kon Kim -- A power control scheme for an energy-efficient MAC protocol / Ho-chul Lee, Jeong-hwan Hwang, Meong-hun Lee, Haeng-kon Kim, and Hyun Yoe -- Towards the designing of a robust intrusion detection system through an optimized advancement of neural networks / Iftikhar Ahmad, Azween B Abdulah, and Abdullah S Alghamdi.

Annotation This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June 2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry professionals to catch up on recent progress in the related areas. The 49 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and improvement from more than 1000 initial submissions. The papers emanate from the four following international conferences: Information Security and Assurance (ISA 2010), Advanced Communication and Networking (ACN 2010), Advanced Science and Technology (AST 2010), and Ubiquitous Computing and Multimedia Applications (UCMA 2010). This volume focuses on various aspects of advance.

Print version record.

Powered by Koha