Search Results - "2011 International Conference on Information Science and Applications"

Refine Results
  1. 1

    Indoor positioning in Bluetooth networks using fingerprinting and lateration approach by Subhan, F, Hasbullah, H, Rozyyev, A, Bakhsh, S T

    “…Global Positioning System (GPS) is a well known navigation system for outdoor applications; however this technology does not work in indoor environments. In…”
    Get full text
    Conference Proceeding
  2. 2

    The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters by Tran Manh Thang, Juntae Kim

    “…DBSCAN is one of powerful density-based clustering algorithms for detecting outliers, but there are some difficulties in finding its parameters (epsilon and…”
    Get full text
    Conference Proceeding
  3. 3

    A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service by Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu, Chien-Hsing Wu

    “…Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access…”
    Get full text
    Conference Proceeding
  4. 4

    A Study on Machine Learning Algorithms for Fall Detection and Movement Classification by Choi, Y, Ralhan, A S, Ko, S

    “…Falls among the elderly is an important health issue. Fall detection and movement tracking are therefore instrumental in addressing this issue. This paper…”
    Get full text
    Conference Proceeding
  5. 5

    Towards the Development of Personal Cloud Computing for Mobile Thin-Clients by Yuan Tian, Biao Song, Eui-Nam Huh

    “…The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront…”
    Get full text
    Conference Proceeding
  6. 6

    Streaming Media with Sensory Effect by Bumsuk Choi, Eun-Seo Lee, Kyoungro Yoon

    “…4D is an irresistible new trend in movie industry. Also the Digital Cinema technology is pervasive in most of theatre system. They provide movies in streaming…”
    Get full text
    Conference Proceeding
  7. 7

    Multi-Modal CAPTCHA: A User Verification Scheme by Almazyad, A S, Ahmad, Y, Kouchay, S A

    “…CAPTCHA is an automated test that humans can pass, but current computer programs can't pass any program that has high success over a CAPTCHA can be used to…”
    Get full text
    Conference Proceeding
  8. 8

    A Study on Malicious Codes Pattern Analysis Using Visualization by DongHwi Lee, In Soo Song, Kim, K J, Jun-hyeon Jeong

    “…The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has…”
    Get full text
    Conference Proceeding
  9. 9

    On the Development of a Sensor Module for Real-Time Pollution Monitoring by Shum, L V, Rajalakshmi, P, Afonja, A, McPhillips, G, Binions, R, Cheng, L, Hailes, S

    “…In a Wireless Sensor Network (WSN) application for ambient pollution monitoring, which involves the deployment of a large number (i.e. ~100) of sensors in…”
    Get full text
    Conference Proceeding
  10. 10

    Injection Attack Detection Using the Removal of SQL Query Attribute Values by Jeom-Goo Kim

    “…The expansion of the Internet has made web applications become a part of everyday life. As a result the number of incidents which exploit web application…”
    Get full text
    Conference Proceeding
  11. 11

    An Ontology-Based Recommendation System Using Long-Term and Short-Term Preferences by Jinbeom Kang, Joongmin Choi

    “…Personalized information retrieval and recommendation systems have been proposed to deliver the right information to users with different interests. However,…”
    Get full text
    Conference Proceeding
  12. 12

    Wearable ECG Monitor: Evaluation and Experimental Analysis by Youngsung Kim, Il-yeon Cho

    “…This study presents the design and development of a wearable ubiquitous healthcare monitoring system using integrated electrocardiogram (ECG),…”
    Get full text
    Conference Proceeding
  13. 13

    An Improved Frequent Pattern Tree Based Association Rule Mining Technique by Islam, A B M R, Tae-Sun Chung

    “…Discovery of association rules among the large number of item sets is considered as an important aspect of data mining. The ever increasing demand of finding…”
    Get full text
    Conference Proceeding
  14. 14

    The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone by Woo Bong Cheon, Keon il Heo, Won Gyu Lim, Won Hyung Park, Tai Myoung Chung

    “…Wireless network is one of the 2010s most important security issues. As smartphone(android) is popularize, the number of Wireless Internet users is really…”
    Get full text
    Conference Proceeding
  15. 15

    Software Based Implementation Methodologies for Deep Packet Inspection by Chaudhary, A, Sardana, A

    “…Deep Packet Inspection plays an important role for providing secure and congestion free network. It determines whether incoming traffic matches a database of…”
    Get full text
    Conference Proceeding
  16. 16

    Statistical Pattern Based Real-Time Smoke Detection Using DWT Energy by Chansu Kim, Youngin Han, Yougduck Seo, Hwan-il Kang

    “…This paper proposes a novel method to detect smoke using statistical patterns which are DWT energy. In general, shape of smoke is not clear and color and…”
    Get full text
    Conference Proceeding
  17. 17

    Ontology Based Context Information Model for u-Healthcare Service by Joong-Kyung Ryu, Jong-Hun Kim, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee

    “…One of the personalized service in the ubiquitous For establishing real u-health environments, it is necessary to receive the context information obtained from…”
    Get full text
    Conference Proceeding
  18. 18

    An Investigation of Bluetooth Security Threats by Tan, M, Masagca, K A

    “…Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely…”
    Get full text
    Conference Proceeding
  19. 19

    Context-Aware Based Item Recommendation for Personalized Service by Jong-Hun Kim, Daesung Lee, Kyung-Yong Chung

    “…One of the personalized service in the ubiquitous environment is to provide services or items, which reflect personal tastes, attitudes, and contexts. Because…”
    Get full text
    Conference Proceeding
  20. 20

    Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source by Hongbin Yim, Taewon Kim, Jaeil Jung

    “…DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very…”
    Get full text
    Conference Proceeding