Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.

Author(s): Nurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail (auth.), Tai-hoon Kim, Hojjat Adeli (eds.)
Series: Lecture Notes in Computer Science 6059 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 604
Tags: Computer Communication Networks; Information Systems Applications (incl.Internet); Information Storage and Retrieval; Artificial Intelligence (incl. Robotics); Algorithm Analysis and Problem Complexity; Database Management

Front Matter....Pages -
Fuzzy Based Threat Analysis in Total Hospital Information System....Pages 1-14
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model....Pages 15-27
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition....Pages 28-37
Information Systems Security Criticality and Assurance Evaluation....Pages 38-54
Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’....Pages 55-60
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography....Pages 61-69
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning....Pages 70-81
Post-quantum Cryptography: Code-Based Signatures....Pages 82-99
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol....Pages 100-114
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems....Pages 115-128
An Active Intrusion Detection System for LAN Specific Attacks....Pages 129-142
Analysis on the Improved SVD-Based Watermarking Scheme....Pages 143-149
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes....Pages 150-158
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks....Pages 159-174
Grammar Encoding in DNA-Like Secret Sharing Infrastructure....Pages 175-182
HATS: High Accuracy Timestamping System Based on NetFPGA....Pages 183-195
A Roadside Unit Placement Scheme for Vehicular Telematics Networks....Pages 196-202
Concurrent Covert Communication Channels....Pages 203-213
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks....Pages 214-227
High Performance MAC Architecture for 3GPP Modem....Pages 228-238
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T....Pages 239-249
A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network....Pages 250-263
A Model for Interference on Links in Inter-working Multi-hop Wireless Networks....Pages 264-278
An Optimum ICA Based Multiuser Data Separation for Short Message Service....Pages 279-286
Multiple Asynchronous Requests on a Client-Based Mashup Page....Pages 287-299
Using an Integrated Ontology Database to Categorize Web Pages....Pages 300-309
Topic Detection by Topic Model Induced Distance Using Biased Initiation....Pages 310-323
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm....Pages 324-336
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition....Pages 337-344
Agent Based Approach to Regression Testing....Pages 345-355
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem....Pages 356-362
Development of a Digital Textbook Standard Format Based on XML....Pages 363-377
A Pattern-Based Representation Approach for Online Discourses....Pages 378-384
A Fault Tolerant Architecture for Transportation Information Services of E-Government....Pages 385-396
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS....Pages 397-408
Extract Semantic Information from WordNet to Improve Text Classification Performance....Pages 409-420
Managing Ubiquitous Scientific Knowledge on Semantic Web....Pages 421-430
A Semantic Pattern Approach to Managing Scientific Publications....Pages 431-434
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults....Pages 435-446
Markov Chain Monte Carlo Random Testing....Pages 447-456
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics....Pages 457-468
An Effective Video Steganography Method for Biometric Identification....Pages 469-479
A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction....Pages 480-490
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis....Pages 491-498
Video Copy Detection: Sequence Matching Using Hypothesis Test....Pages 499-508
An XML-Based Digital Textbook and Its Educational Effectiveness....Pages 509-523
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition....Pages 524-533
Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network....Pages 534-543
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming....Pages 544-557
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech....Pages 558-571
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture....Pages 572-585
A Power Control Scheme for an Energy-Efficient MAC Protocol....Pages 586-596
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks....Pages 597-602
Back Matter....Pages -