Search Results - "2011 International Conference on Information Science and Applications"
-
1
Indoor positioning in Bluetooth networks using fingerprinting and lateration approach
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Global Positioning System (GPS) is a well known navigation system for outdoor applications; however this technology does not work in indoor environments. In…”
Get full text
Conference Proceeding -
2
The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…DBSCAN is one of powerful density-based clustering algorithms for detecting outliers, but there are some difficulties in finding its parameters (epsilon and…”
Get full text
Conference Proceeding -
3
A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access…”
Get full text
Conference Proceeding -
4
A Study on Machine Learning Algorithms for Fall Detection and Movement Classification
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Falls among the elderly is an important health issue. Fall detection and movement tracking are therefore instrumental in addressing this issue. This paper…”
Get full text
Conference Proceeding -
5
Towards the Development of Personal Cloud Computing for Mobile Thin-Clients
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront…”
Get full text
Conference Proceeding -
6
Streaming Media with Sensory Effect
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…4D is an irresistible new trend in movie industry. Also the Digital Cinema technology is pervasive in most of theatre system. They provide movies in streaming…”
Get full text
Conference Proceeding -
7
Multi-Modal CAPTCHA: A User Verification Scheme
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…CAPTCHA is an automated test that humans can pass, but current computer programs can't pass any program that has high success over a CAPTCHA can be used to…”
Get full text
Conference Proceeding -
8
A Study on Malicious Codes Pattern Analysis Using Visualization
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has…”
Get full text
Conference Proceeding -
9
On the Development of a Sensor Module for Real-Time Pollution Monitoring
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…In a Wireless Sensor Network (WSN) application for ambient pollution monitoring, which involves the deployment of a large number (i.e. ~100) of sensors in…”
Get full text
Conference Proceeding -
10
Injection Attack Detection Using the Removal of SQL Query Attribute Values
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…The expansion of the Internet has made web applications become a part of everyday life. As a result the number of incidents which exploit web application…”
Get full text
Conference Proceeding -
11
An Ontology-Based Recommendation System Using Long-Term and Short-Term Preferences
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Personalized information retrieval and recommendation systems have been proposed to deliver the right information to users with different interests. However,…”
Get full text
Conference Proceeding -
12
Wearable ECG Monitor: Evaluation and Experimental Analysis
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…This study presents the design and development of a wearable ubiquitous healthcare monitoring system using integrated electrocardiogram (ECG),…”
Get full text
Conference Proceeding -
13
An Improved Frequent Pattern Tree Based Association Rule Mining Technique
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Discovery of association rules among the large number of item sets is considered as an important aspect of data mining. The ever increasing demand of finding…”
Get full text
Conference Proceeding -
14
The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Wireless network is one of the 2010s most important security issues. As smartphone(android) is popularize, the number of Wireless Internet users is really…”
Get full text
Conference Proceeding -
15
Software Based Implementation Methodologies for Deep Packet Inspection
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Deep Packet Inspection plays an important role for providing secure and congestion free network. It determines whether incoming traffic matches a database of…”
Get full text
Conference Proceeding -
16
Statistical Pattern Based Real-Time Smoke Detection Using DWT Energy
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…This paper proposes a novel method to detect smoke using statistical patterns which are DWT energy. In general, shape of smoke is not clear and color and…”
Get full text
Conference Proceeding -
17
Ontology Based Context Information Model for u-Healthcare Service
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…One of the personalized service in the ubiquitous For establishing real u-health environments, it is necessary to receive the context information obtained from…”
Get full text
Conference Proceeding -
18
An Investigation of Bluetooth Security Threats
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely…”
Get full text
Conference Proceeding -
19
Context-Aware Based Item Recommendation for Personalized Service
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…One of the personalized service in the ubiquitous environment is to provide services or items, which reflect personal tastes, attitudes, and contexts. Because…”
Get full text
Conference Proceeding -
20
Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source
Published in 2011 International Conference on Information Science and Applications (01-04-2011)“…DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very…”
Get full text
Conference Proceeding