Information Science and Applications 2017: ICISA 2017 1st Edition by Kuinam Kim, Nikolai Joukov – Ebook PDF Instant Download/DeliveryISBN: 9811041549, 9789811041549
Full download Information Science and Applications 2017: ICISA 2017 1st Edition after payment.

Product details:
ISBN-10 : 9811041549
ISBN-13 : 9789811041549
Author: Kuinam Kim, Nikolai Joukov
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology.
Information Science and Applications 2017: ICISA 2017 1st Table of contents:
Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP
Abstract
1 Introduction
2 CoMP and Semi-smart Antennas
3 Genetic Algorithm Configuration
3.1 Encoding and Decoding
3.2 Fitness Function
3.3 Constraint Handling
3.4 Simulation Parameters
4 Simulation Result
5 Conclusion
References
Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges
Abstract
1 Introduction
1.1 Location Privacy and Its Need
2 Privacy Protection Strategies and Mechanisms
2.1 Regulatory Strategies
2.2 Policy Based
2.3 Location Obfuscation
2.4 Data Transformation
2.5 PIR Based Location Privacy
3 Common Attacks and Challenges in Location Privacy
4 Open Challenges and Future Research Directions
5 Conclusion
References
An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks
1 Introduction
2 The Details of DUOR
2.1 Every Node Updates Its Own Hop-Count
2.2 The Sensor Node Sends the Packet
2.3 The Intermediate Nodes Forward the Packet
2.4 The Sink Node Receives the Packet
3 Simulations and Discussions
References
A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors
Abstract
1 Introduction
2 The Mobile Online Vehicle Status Awareness System (MOVSAS)
2.1 Data Preprocessing
2.2 Using PCA for Feature Selection
2.3 Online Training Model
3 Experiment and Results
3.1 Experiment Environment
3.2 Data Collection
3.3 The Accuracy of Vehicle Status Awareness
3.4 The Processing Time
4 The Conclusion and Future Work
References
A Study on OPNET State Machine Model Based IoT Network Layer Test
Abstract
1 Introduction
2 OPNET Modelling for Test Case Generation
2.1 IoT Network Layer and OPNET Simulation
2.2 Network Layer State Machine for Test Case Generation
3 Experiment Result and Analysis
4 Conclusions
References
A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networ
Abstract
1 Introduction
2 Confidence Constraint Based Secure Localization Algorithm
2.1 Confidence Constraint of Reference Nodes
2.2 Confidence Constraint Satisfaction Problem
3 Performance Evaluation
Acknowledgment
References
Networks and Information Systems
Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network
Abstract
1 Introduction
2 Method
2.1 Preliminaries
2.2 Algorithm
3 Result
4 Conclusion
Acknowledgement
References
AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network
Abstract
1 Introduction
2 AMI Network Architecture
3 The Design of AMI Network Simulator
3.1 The Architecture of AMI Network Simulator
3.2 The Design of Simulator Core Engine
3.3 The Design of Analyzer
4 Performance Evaluation
4.1 Selective Handicapped Node Test
4.2 CUD Calculation Test
5 Conclusion
Acknowledgments
References
Beyond Map-Reduce: LATNODE – A New Programming Paradigm for Big Data Systems
Abstract
1 Introduction
2 Background and Related Works
3 Extending the Model
3.1 Existing Model (Base Case)
3.2 Adding Heterogeneous Nodes
3.3 Results in an Unbalanced Tree
3.4 Simulator Results
4 Balancing the Tree
5 Conclusion
Acknowledgements
References
Indoor Positioning Solely Based on User’s Sight
1 Introduction
2 State of the Art
3 Our Approach to Indoor Positioning
4 Application
5 Experiments
6 Results
7 Conclusion
References
Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms
Abstract
1 Introduction
2 Related Work
3 The Proposed Framework
3.1 Naming Convention Using RBAC
3.2 The User Subscription Module (USM)
3.3 The Cloud Controller Module (CCM)
3.4 The Proposed Scenario
3.5 Implementation
4 Framework Evaluation and Results
4.1 Measuring Efficiency
4.2 Measuring Search Improvement
4.3 Measuring Scalability
5 Conclusion and Future Works
Acknowledgments
References
Multimedia and Visualization
Korean/Chinese Web-Based Font Editor Based on METAFONT for User Interaction
Abstract
1 Introduction
2 Related Works
2.1 METAFONT
2.2 MMF
2.3 Metaflop
2.4 Structural Font Generating Program
3 Extraction of Parameter for Font Style Change
3.1 Classification of Character Element
3.2 Implementation of Korean Font Parameter
3.3 Applying the Parameters of Chinese Font
4 Implementation Korean/Chinese Web-Based Font Editor Based on METAFONT
5 Conclusions
Acknowledgements
References
A Highly Robust and Secure Digital Image Encryption Technique
Abstract
1 Introduction
2 Proposed Encryption Technique
3 Results and Discussion
4 Conclusion
References
Saliency Based Object Detection and Enhancements in Static Images
Abstract
1 Introduction
2 Independent Component Analysis
3 Proposed Methodology
4 Edge Detection
5 Morphological Operation
6 Results
6.1 Results by Applying Algorithm on the Dataset
7 Comparison Between ICA, Edge Detection Technique and Morphological Operation
8 Comparison of Two Computational Models and the AUC Score
9 Conclusions
References
A Center Symmetric Padding Method for Image Filtering
Abstract
1 Introduction
2 The Proposed Method
3 Simulation
4 Conclusion
Acknowledgements
References
Implementing a Stereo Image Processing for Medical 3D Microscopes with Wireless HMD
Abstract
1 Introduction
1.1 3D Microscope with HMD
1.2 Issues
1.3 Our Solutions
2 Stereo Image Processing for 3D Microscope
2.1 Stereo Image Correction
2.2 Color Correction
2.3 Real-Time Implementation with GPU
3 3D Surgical Microscope with Wireless HMD
4 Implementation and Result
4.1 System Configuration and Operation Explanation
4.2 Performance Testing and Result
5 Conclusion
Acknowledgments
References
Design of OpenGL SC 2.0 Rendering Pipeline
Abstract
1 Introduction
2 Design of the Rendering System
2.1 Overall Design
2.2 Context Part
2.3 Renderer Part
3 Implementation Strategy
3.1 Implementing the Context Part
3.2 Renderer Part: Emulator-like Implementation
3.3 Renderer Part: GPU Command-Based Implementation
3.4 Renderer Part: Vulkan-Based Implementation
3.5 Renderer Part: Massively-Parallel Implementation
3.6 VLSI Chip-Based Implementation
4 Conclusions and Future Works
Acknowledgement
References
Saliency Detection via Foreground and Background Seeds
Abstract
1 Introduction
2 Related Work
3 Algorithm
3.1 Graph Construction
3.2 Coarse Saliency Detection Using Background Seeds
3.3 Salient Detection via Foreground Seeds
4 Experimental Results
4.1 Qualitative Results
4.2 Quantitative Results
5 Conclusion
Acknowledgement
References
Identification and Annotation of Hidden Object in Human Terahertz Image
Abstract
1 Introduction
2 Materials and Methods
2.1 Terahertz Imaging Acquisition
2.2 Image Preprocessing
2.3 Classification of THz Image
2.4 Extract the Body Contour
3 Results
4 Conclusion
Acknowledgements
References
Information Visualization for Mobile-Based Disability Test Applications
Abstract
1 Introduction
2 Related Research
3 A Study of Mobile Applications for Disability Tests
4 Information Visualization for Mobile-Based Disability Test Applications
5 Conclusion
References
Deep Convolutional Neural Networks for All-Day Pedestrian Detection
Abstract
1 Introduction
2 Related Work
3 All-Day Pedestrian Detection Based on Faster-RCNN
3.1 RPN Network
3.2 Fast R-CNN Network
3.3 Implementation Details
4 Experiment Result
4.1 Datasets
4.2 Evaluation Metrics
4.3 Comparison with the State-of-the-Art
4.4 Analysis of Computational Time
5 Conclusions
References
An Augmented Reality Learning System for Programming Concepts
Abstract
1 Introduction
2 Literature Review
2.1 Current State of AR in Education Field
2.2 AR Development Tools – Unity 3D
3 Design and Implementation
3.1 Pre-evaluation Survey
3.2 Marker Development
3.3 Identify and Altering Animation
3.4 Marker Training
3.5 Post-evaluation Survey
4 AR Learning System Performance Evaluation
5 Discussion and Conclusion
References
Middleware and Operating Systems
Efficient vCore Based Container Deployment Algorithm for Improving Heterogeneous Hadoop YARN Perform
Abstract
1 Introduction
2 Background
2.1 Handling Heterogeneity Through Scheduling
2.2 Benchmark on Virtualized Resource
2.3 Container and vCore in YARN
3 vCore Based YARN Container Deployment for Heterogeneous Environment
3.1 Modeling the Performance Impact Factors
3.2 Container Equalization
3.3 Fairness Guarantee
4 Evaluation
4.1 The Degree of Equalization
4.2 Utilization and Fairness
5 Conclusion
Acknowledgement
Appendix A: The Variation on the No. of vCores and Job Completion Time
Appendix B: The Result of the Variation on the Weight
References
A Real-Time Operating System Supporting Distributed Shared Memory for Embedded Control Systems
Abstract
1 Introduction
2 Distributed Shared Memory Model
2.1 Design Policies
2.2 Consistency Model
3 Specification and Implementation
3.1 API and OIL for Distributed Shared Memory
3.2 Distributed Shared Memory Mechanism
4 Experimental Evaluation
5 Conclusion
Acknowledgment
References
Security and Privacy
MBR Image Automation Analysis Techniques Utilizing Emulab
1 Introduction
2 Related Work
2.1 Malware Testing Environment Validation for Emulab
2.2 MBR Recovery from Crashed Operating System in Emulab
3 System Architecture
4 Experiment
5 Conclusion
References
Detection of DNS Tunneling in Mobile Networks Using Machine Learning
Abstract
1 Introduction
2 State-of-the-Art Detection and Prevention of DNS Tunneling
3 Brief Introduction to DNS Tunneling in the Mobile Network
4 Challenges in Detection of DNS Tunneling
5 How Can Machine Learning Help
6 DNS Tunneling Detection Using Machine Learning
7 Conclusion
References
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
1 Introduction
2 Key Derivation Function
2.1 Collision Analysis
2.2 Provable Security – Random Oracle Model (ROM)
2.3 Formal Security Analysis on KDF Proposals
2.4 The Security of KDF – Adaptive Chosen Public Inputs Model With Multiple Salts (CPM)
2.5 Two-Phase Key Derivation Function
3 KDF Security Analysis
4 Conclusion
References
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
1 Introduction
2 The System Architecture of Cloud-Based Telemedicine Service
3 Review of Chiou et al.’s Telemedicine Scheme
3.1 Healthcare Center Uploading Phase
3.2 Patient Uploading Phase
3.3 Treatment Phase
3.4 Checking Report Phase
4 Cryptanalysis of Chiou et al.’s Telemedicine Scheme
4.1 Inspection Report Disclosure Attack
4.2 Treatment Record Disclosure Attack
4.3 Relationship Linkability Problem Between Patient and Doctor
5 Conclusions
References
Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying System
Abstract
1 Introduction
2 System Model
2.1 Energy Harvesting Scheme
2.1.1 Decode-and-Forward
2.1.2 Amplify-and-Forward
3 Achievable Secrecy Rate
3.1 DF Scheme
3.2 AF Scheme
4 Numerical Results
5 Conclusion
References
A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 2700
Abstract
1 Introduction
2 Related Work
2.1 Related Theories
2.1.1 ISO27001
2.1.2 Ontology
2.1.3 Web Ontology Language (OWL)
2.1.4 WordNet
2.1.5 Simple Protocol and RDF Query Language (SPARQL)
2.2 Related Research
3 The Proposed Design
3.1 A Workflow of the Proposed Concept
3.2 Architecture Design
3.3 Context Similarity Comparison on Ontology
4 Model Validation
5 Conclusion
Acknowledgement
References
Timing Side Channel Attack on Key Derivation Functions
1 Introduction
2 Related Works
2.1 KDFs Based on Steam Ciphers
2.2 KDFs Based on Hash Functions
2.3 KDFs Based on Block Ciphers
2.4 Side Channel Attack
3 Timing Side Channel Attacks
4 Result and Discussion
5 Conclusion
References
A Security Aware Fuzzy Embedded ACO Based Routing Protocol (SAFACO) in VANETs
Abstract
1 Introduction
1.1 VANETs
1.2 Ant Colony Optimization
1.3 Fuzzy Logic
2 Related Work
3 Attack Model
4 Proposed Idea
4.1 Authentication
4.2 Data Consistency
4.3 Privacy
4.4 Detection of Malicious Vehicles
5 Conclusion and Future Work
References
Cryptanalysis of “An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable
1 Introduction
2 Review of Wu et al.’s SCF-PEKS Scheme
2.1 Initialization
2.2 Data Processing
2.3 Search
2.4 Record Retrieval
3 Outsider Attacks on Wu et al.’s SCF-PEKS Scheme
3.1 Fails to Provide Message Authentication
3.2 Fails to Provide Untraceability
3.3 Record Forgery Attacks
4 Privileged-Insider Attacks on Wu et al.’s SCF-PEKS Scheme
5 Conclusions
References
eDSDroid: A Hybrid Approach for Information Leak Detection in Android
Abstract
1 Introduction
2 Related Work
3 Proposed System
3.1 ESA Builder
3.2 ESA Receiver
3.3 Application Interactor
3.4 Log Analyzer
4 Evalution
4.1 Dataset
4.2 Result
5 Conclusions and Future Work
Acknowledgments
References
Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic
Abstract
1 Introduction
2 Motivation Examples
3 uitHyDroid System
4 Evaluation
5 Conclusion
Acknowledgments
References
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme
1 Introduction
1.1 Our Contribution
1.2 Organization
2 Sealed-Bid Auction Scheme
3 Howlader et al.’s ESBA Scheme
4 The Known Bid Attack
4.1 Discussion
5 The Fix
5.1 Discussion
6 Conclusion
References
Perceptual 3D Watermarking Using Mesh Saliency
1 Introduction
2 Related Work
3 Perceptual Watermarking Scheme
3.1 Mesh Saliency
3.2 Watermark Embedding Using Saliency
3.3 Watermark Extraction
4 Experimental Results
4.1 Human Perceptually-Based Quality
4.2 Robustness Against Attacks
5 Conclusion
References
Perceptual Watermarking for Stereoscopic 3D Image Based on Visual Discomfort
1 Introduction
2 Background
2.1 Visual Discomfort Assessment
2.2 The Depth-of-Field
3 Proposed Method
3.1 Perceptual Masking Construction
3.2 Watermark Embedding and Extraction
4 Experimental Results
4.1 Visual Quality
4.2 Robustness
5 Conclusion
References
Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks
1 Introduction
2 Proposed Method
2.1 Preprocessing
2.2 Convolutional Neural Networks
2.3 Final Spoof Decision
3 Experimental Results
3.1 Datasets
3.2 Performance Metrics
3.3 Implementation Details
3.4 Results
4 Conclusion
References
Content Recapture Detection Based on Convolutional Neural Networks
1 Introduction
2 Related Work
3 Proposed Method for Recaptured Image Detection
3.1 The Architecture of CNN
3.2 Proposed CNNs Architecture
4 Experimental Results
5 Conclusion
References
Secret Sharing Deniable Encryption Technique
Abstract
1 Introduction
2 Forms of Deniability Characteristics
3 Related Works
4 Secret Sharing Scheme
5 Secret Sharing Deniable Encryption
6 Implementation
7 Research Analysis and Findings
8 Conclusions
Acknowledgment
References
Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map
1 Introduction
2 3D Mesh Statistical Feature Extraction
3 Feature Mapping Using Homogeneous Kernel Map
4 Experimental Results
5 Conclusion
References
From Sealed-Bid Electronic Auction to Electronic Cheque
1 Introduction
1.1 Our Contributions
1.2 Organization
2 Sealed-Bid e-Auction
2.1 Definition
2.2 Security Model
3 e-Cheque
3.1 Definition
3.2 Security Model
4 Generic Transformation from Seal-Bid e-Auction to e-Cheque
5 An Instance
6 Conclusion
References
Enhanced Database Security Using Homomorphic Encryption
Abstract
1 Introduction
2 Problem
3 Survey of Existing Methods
3.1 Paillier
3.2 RSA
3.3 Gentry
3.4 Warren
4 Approach
4.1 Algorithm
4.2 Decision for Java
5 Implementation
6 Performance Analysis
6.1 Limitations
6.2 Drawbacks: Analysis of Overflow and Effectiveness
7 Conclusions
Acknowledgments
References
k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files
1 Introduction
2 Structure of PDF
2.1 Object, Categorized by Types
2.2 File Structure
2.3 Document Structure
2.4 Common Shellcode Types
3 k-depth Mimicry Attack
4 Experiments
5 Conclusion
References
Reconstruction of Task Lists from Android Applications
1 Introduction
2 Background and Motivating Example
2.1 Tasks and Back Stack
2.2 Motivating Example
3 System Design
3.1 System Overview
3.2 Static Preprocessor
3.3 Dynamic Runner
4 Application Scenarios
5 Conclusion and Future Work
References
Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
1 Introduction
2 General Formulation of the Chaotic Iterations
3 Security Tools Based on CIs
3.1 Pseudorandom Number Generator with CIs
3.2 CIs-Based Hash Function
4 Experimental Evaluation
4.1 Hash Values
4.2 Diffusion and Confusion
4.3 Collision Analysis
5 Conclusion
References
Data Mining and Artificial Intelligence
Intellectual Overall Evaluation of Power Quality Including System Cost
Abstract
1 Introduction
2 Units of Power Quality
2.1 Indices of Power Quality, Operation, etc.
2.2 Units of Power Quality Item and Their Mismatch
2.3 Case Study: Application to a Sample System
3 Ideal AHP
3.1 Ahp
3.2 Ideal AHP
4 Overall Evaluation Model
4.1 Overall Evaluation Model for Distribution System
4.2 Case Study: Application to a Sample System
5 Conclusion
References
A Data-Driven Decision Making with Big Data Analysis on DNS Log
Abstract
1 Introduction
2 Analysis
2.1 The Data Set
2.2 The Proposed Method
3 The Results
3.1 The Most Visited Domains Per Country
3.2 A Detection of Hidden Malwares
3.3 A Geographical Visualization
4 Conclusion
References
A Case-Based Approach to Colorectal Cancer Detection
Abstract
1 Introduction
2 Knowledge Representation and Reasoning
2.1 Quantitative Knowledge
2.2 Qualitative Knowledge
3 A Case Based Methodology for Problem Solving
4 Case Study
4.1 A Logic Programming Approach to Data Processing
4.2 A Case Based Approach to Computing
5 Conclusions
Acknowledgments
References
Multi-Modes Cascade SVMs: Fast Support Vector Machines in Distributed System
Abstract
1 Introduction
2 Related Works
3 ARC: Adaptively Reshaping Cascade SVMs
4 MMP: Predicting Algorithm Based on Multi-Modes Cascade SVMs
5 Experiments
6 Conclusion
Acknowledgment
References
Deep Learning Based Recommendation: A Survey
Abstract
1 Introduction
2 Background
2.1 Recommendation
2.2 Deep Learning
3 Classification of Deep Learning Based Recommendation Methods
3.1 Classification Framework
3.2 Classification by Input
3.3 Classification by Output
4 Future Research Directions
5 Conclusion
Acknowledgments
References
Towards Collaborative Data Analytics for Smart Buildings
Abstract
1 Introduction
2 Overview of Collaborative Data Processing for Buildings
2.1 Collaborative Data Processing
2.2 Collaborative Data Processing for Smart Buildings: State of the Art
3 Collaborative Data Analytics for Smart Buildings
3.1 Data Analytics Needs of Smart Buildings
3.2 Opportunities for Collaborative Data Processing for Smart Buildings
3.3 Collaboration Models
4 Advantages Analysis Through an Illustrative Example
5 Summary and Outlook
Acknowledgements
References
People also search for Information Science and Applications 2017: ICISA 2017 1st:
wseas transactions on information science and applications
wseas transactions on information science and applications impact factor
wseas transactions on information science and applications scimago
international conference on information science and applications
wseas transactions on information science and applications scopus
Tags: Information Science, Applications, ICISA, Kuinam Kim, Nikolai Joukov


