20110611 Program(Draft)

advertisement
August 15 2011
Registration Open 08:50 ~
Coffee Break with Cookie
09:00~09:30
Sessions
09:30~11:30
09:30~09:45
Technical Session 1
Technical Session 2
Technical Session 3
Seminar Room A
Seminar Room B
Seminar Room C
Robert Young Chul Kim
Suwon Park
Dong Hwa Kim
AFIT 2011
EECN 2011
A Study on Test Case Generation based on State Diagram in Modeling & An efficient sleep mode procedure for IEEE 802.16e femtocell base station
Simulation Environment
Woo Yeol Kim, Hyun Seung Son, and Robert Young Chul Kim
Sujin Kwon, Young-uk Chung, and Yong-Hoon Choi
Real-Time Intelligent Home Network Control System
09:45~10:00
10:00~10:15
Yong-Soo Kim
LCN: Largest Neighbor nodes based Routing for Delay and Disruption
Tolerant Mobile Networks
Doo-Ok Seo, Gwang-Hyun Kim, Dong-Ho Lee
A Perspective of Domestic Appstores compared with Global Appstores
10:15~10:30
10:30~10:45
10:45~11:00
11:00~11:15
11:15~11:30
Byungkook Jeon
HuCare 2011
Fault Tolerance Multi-Agents for MHAP Environment: FTMA
SoonGohn Kim, Eung Nam Ko
Performance Analysis of Wireless LANs with a Backoff Freezing
Effective Method Tailoring in Construction of Medical Information System
Mechanism
Ho Young Hwang, Seong Joon Kim, Byung-Soo Kim, Dan Keun Sung, and
WonYoung Choi, SoonGohn Kim
Suwon Park
Energy Saving Method for Wi-Fi Stations Based on Partial Virtual Bitmap
Integrated Retrieval System for Rehabilitation Medical Equipment in
Distributed DB Environments
Sangmin Moon, Taehyu Shin, Suwon Park, Hyunseok Lee, Chae Bong
BokHee Jung, ChangKeun Lee, SoonGohn Kim
Sohn, Young-uk Chung, Ho Young Hwang
Performance Analysis of Forward link Transmit Power Control during Soft
An fMRI study of reading different word form
Handoff in Mobile Cellular Systems
Jin Kim, Suwon Park, Hyunseok Lee, Hyuk-jun Oh
Hyo Woon Yoon, Ji-Hyang Lim
A Design of Retrieval System for Presentation Documents Using ContentBased Image Retrieval
Hongro Lee, Kwangnam Choi, Kiseok Choi, Jaesoo Kim
A Handover Scheme for Improving Throughput Using Vehicle’s Moving
Path Information
Sang Hyuck Han, Suwon Park, Yong-Hoon Choi
Systematic Design of Context Awareness Mobile Learning Environment
Data Quality Management based Data Profiling in e-Government
Environments
Youn-Gyou Kook, Joon Lee, Min-Woo Park, Ki-Seok Choi, Jae-Soo Kim,
Soung-Soo Shin
Design of Code Template for Automatic Code Generation of
Heterogeneous Smartphone Application
Woo Yeol Kim, Hyun Seung Son, and Robert Young Chul Kim
Performance Improvement Method for WiFi Networks Sharing Spectrum
Intelligent Feature Selection by Bacterial Foraging Algorithm and
Information Theory
Jae Hoon Cho, Dong Hwa Kim
Jongwoo Kim, Suwon Park, Seung Hyong Rhee, Yong-Hoon Choi,
HoYoung Hwang, Young-uk Chung
Effects of the Location of APs on Positioning Error in RSS value based
Scheme
Hyeonmu Jeon, Uk-Jo, Mingyu-Jo, Nammoon Kim, Yongok Kim
The intelligent video and audio recognition black-box system of the elevator
for the disaster and crime prevention
Woon-Yong Kim, Seok-Gyu Park, Moon-Cheol Lim
11:30~11:50
Welcome Ceremony
11:50~13:00
Lunch Time
Ki-Sang Song, JongHwa Park, JaeKyung Kim
A Study on the Access Control Module of Linux Secure Operating System
JinSeok Park, SoonGohn Kim
Sessions
13:00~15:00
13:00~13:15
13:15~13:30
13:30~13:45
13:45~14:00
Technical Session 11
Technical Session 12
Technical Session 13
Seminar Room A
Seminar Room B
Seminar Room C
Session Chair
Session Chair
Session Chair
IWIT 2011 Part 1
IWIT 2011 Part 2
IWIT 2011 Part 3
Vehicle Tracking Based on Kalman Filter in Tunnel
An Efficient Private Registry Management System using DHT based on
FIPA Agent Platform
Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Name
and Dong-Ryeol Shin
Topology Configuration for Effective In-Ship Network Construction
A study for security scheme and the right to be forgotten based on social
network service for smart-phone environment
Jang-Mook Kang, You-Jin Song, Jae-sang Cha, Seon-hee Lee
Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu
Distributed Color Tracker for Remote Robot Applications and Simulation
Environment
Yong-Ho Seo
Interference Analysis of Digital HD Radio System considering Angular
Effect
Jooseok Kim, Wonho Jung, Kyungseok Kim
Mi-Jin Kim, Jong-Wook Jang
Development of Integrated Adapter Based on Multi-Sensor Networks for
Tracking and Surveillance
Jun-Pil Boo, Do-Hyeun Kim
The Realization of Monitoring System for Patient’ History Using RFID and
Embedded Linux
Heung-kuk Jo
A study on dynamic gateway system for MOST GATEWAY Scheduling
Algorithm
Seong-Jin Jang, Jong-Wook Jang
The Contents based Music Retrieval Method using Audio Feature Analysis A Seamless Inter-LMA Handoffs Scheme Based on 2-Layer in Hierarchical
against Polyphonic Music
Proxy Mobile IPv6 Networks
Chai-Jong Song, Seok-Pil Lee, Hochong Park
Jongpil Jeong, Dong Ryeol Shin, Seunghyun Lee and Jaesang Cha
Implement smart blackbox system with OBD-II, MOST networks
Sung-Hyun Baek, Jong-Wook Jang
Mobile Robot Control using Smart Phone and its Performance Evaluation
A study for method of construct encryption scheme for supporting range
query based on Bucket ID Transformation about Sensor Applications
A study for LED (light-emitting diode) applied with Algorithm based on
Emotion Processing Scheme using Social Network Service
Yong-Ho Seo, Seong-Sin Kwak and Tae-Kyu Yang
You-Jin Song, Jaesang Cha, Jang-Mook Kang
Jang-Mook Kang, Jae-Sang Cha, You-Jin Song, Jeong-Jin Kang, JinYoung Kim, Yeong-Min Jang
SPECTRAL DIMENSIONALITY REDUCTION BASED ON BISPECTRUM
PHASE FOR HYPERSPECTRAL IMAGE CLASSIFICATION
Khairul Muzzammil Saipullah and Deok-Hwan Kim
14:00~14:15
14:15~14:30
14:30~14:45
14:45~15:00
A Noise Robust Echo Canceller with Post-Processing using Liner Predictor Improvement of Message Processing Method for SOA based Digital Setand Wiener Filter
top Box system
Hyuntae Kim C26, Daehyun Ryu, Jangsik Park
Ji-Yeon Hwang, Seung-Jung Shin, Dae-Hyun Ryu
Implementation Fire Detection Algorithm Using Fixed Point Digital Signal
Processor
Jangsik Park, Hyuntae Kim, Yunsik Yu
A Data Management Method to Secure Data in Cloud Computing
Environment
You-Jin Song, Jae-sang Cha, Jang-Mook Kang, Wan-sik Kim
High Speed and Low-complexity Mode Decision for Advanced Video
Coding
Byoungman An, Youngseop Kim, Oh-Jin Kwon
Study on Data transmission using MediaLB Communication in Vehicle
Network
Chang-Young Kim, Jong-Wook Jang
VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication
A Fast and Secure Method to Preserve Anonymity for Electronic Voting
Dongjae Song, Soongyu Kwon, Chun-Guan Kim, and Jong Tae Kim
Hyungkyu Yang, Yunho Lee, and Younghwa An
Coffee Break with Cookie
15:00~15:30
Sessions
15:30~17:30
15:30~15:45
Technical Session 21
Technical Session 22
Technical Session 23
Seminar Room A
Seminar Room B
Seminar Room C
Session Chair
Session Chair
Session Chair
IWIT 2011 Part 4
IWIT 2011 Part 5
IWIT 2011 Part 6
A scheme for Emotion Communication System using LED (light-emitting
diodes) Lights blending or mixing RGB Colors
Jang-Mook Kang, Jae-Sang Cha
Vessel Tracking Using Adaboost Algorithm and AIS Information
Developing two Dimensional Film Speaker using Piezoelectric Materials
Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu
Keehong Um, Jeong-Jin Kang
Robust Congestion Control Design for Input Time Delayed AQM System
15:45~16:00
16:00~16:15
An Extended Could Computing Architecture for Immediate Sharing of
Avionic Contents
Doo-Hyun Kim, Seunghwa Song, Seung-Jung Shin, and Neungsoo Park
Experimental Performance Evaluation of Neural Network and Logistic
Regression Model for Heart Disease Prediction
Yong-Gyu Jung
Security Weaknesses of Remote User Authentication Scheme Preserving
User Anonymity
Young-Hwa An and Hyungkyu Yang
Cache Performance Analysis for Block Size Selection
Prototype implementation of the Direct3D-on-OpenGL library
Neungsoo Park
Joo-Young Do, Nakhoon Baek, Kwan-Hee Yoo
An Intelligent Clustering Method for Highly Similar Digital Photos Using
Pyramid Matching with Human Perceptual 25 Color Histogram
Real time music retrieval based on GPGPU
Performance Analysis of HDD and DRAM-SSD using TPC-H Benchmark
on MYSQL
Dong-Sung Ryu, Kwang-Hwi Kim, Hwan-Gue Cho
Sang-il Lee, Kyoungro Yoon, Neungsoo Park
Song Hyun-Ju, Lee Younghun, Cheong Seung-Kook
Requiremets analysis and critical requirement derivation method using
Macrostruktur
Yong-Kyun Cho and Young-Bum Park
Relative Self-Localization Base on Fish-eye Lenses and SIFT Algorithm for
Indoor Mobile Robot
Xing Xiongand Byung-Jae Choi
User Authentication Platform using Provisioning in Cloud Computing
Environment
Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi
Ji Hoon Yang, Seung Jung Shin, Dong Kyun Lim, Jeong Jin Kang
16:15~16:30
16:30~16:45
16:45~17:00
17:00~17:15
17:15~17:30
A scheme for Role-Based 3D CCTV using CS-RBAC (Context-Sensitivity
User-Oriented Pseudo Biometric Image Based One-Time Password
Role-Based Access Control)
Mechanism on Smart Phone
Jang-Mook Kang, Jae-Sang Cha, You-Jin Song, Goo-Man Park, EunWonjun Jang, Sikwan Cho, Hyung-Woo Lee
Young Ko Myong-chul Shin, Jeong-Jin Kang, You-Sik Hong
Adapting Model Transformation Approach for Android Smartphone
Implementation of Switching Driving Module with ATmega16 processor
Application
based on Visible LED Communication System
Woo Yeol Kim, Hyun Seung Son, Jae Seung Kim, and Robert Young Chul
Geun-Bin Hong, Tae-Su Jang and Yong K. Kim
Kim
Implementation of a Volume Controller for Considering Hearing Loss in A Performance Evaluation on the Broadcasting Scheme for Mobile Ad-hoc
Bluetooth Headset
Networks
Hyuntae Kim, Daehyun Ryu, Jangsik Park
Kwan-Woong Kim, Tae-Su Jang and Yong K. Kim
Context Model Based on Ontology in Mobile Cloud Computing
Changbok Jang, Euiin Choi
SPECC - A New Technique for Direction of Arrival Estimation
In-Sik Choi
August 16 2011
Registration Open 09:30 ~
Coffee Break with Cookie
09:30~10:00
Conference Hall
Chair :
10:00~11:45
Title of Invited Talk #1
Inveted Speaker #1
Lunch Time
11:45~13:15
Conference Hall
Chair :
13:15~15:00
Title of Invited Talk #2
Inveted Speaker #2
Coffee Break with Cookie
15:00~15:30
Sessions
15:30~17:30
15:30~15:45
15:45~16:00
16:00~16:15
16:15~16:30
Technical Session 31
Technical Session 32
Seminar Room A
Seminar Room B
Session Chair
Session Chair
ACN Part 1
Security and Application Part 1
Clock Synchronization for One-Way Delay Measurement : A Survey
Mapping based on Three Cameras for 3D face Modeling
Minsu Shin, Mankyu Park, Deockgil Oh, Byungchul Kim, Jaeyong Lee
Jae-gu Song, Seoksoo Kim
Analysis of the Characteristics of EEG caused by Dyspnea and the Influence of the Environmental Factors
Privacy Reference Architecture for Personal Information Life Cycle
Jeong-Hoon Shin
Yongnyuo Shin, Woobong Chun, Hongsoon Jung
A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment
Forward DiffSig Scheme with MABS for Multicast Authentication
Sungmo Jung, Jong Hyun Kim, Seoksoo Kim
RADHIKA R, KANNAN A, BOSE S, VIJAYAKUMAR P
Retrofit to CAIN of IP-based Supervisory Control and Data Acquisition System
Face Recognition: PCA VS. 2DPCA
Maricel O. Balitanas
Anand Deshpande
16:30~16:45
16:45~17:00
17:00~17:15
17:15~17:30
A Quality of Service Algorithm to Reduce Jitter in Mobile Networks
An image authenticated encryption scheme based on chaotic maps
P. Calduwel Newton
Jing Qiu, Xiaofeng Liao, Di Xiao, Ping Wang
Multiple Object Tracking using SIFT Features and Location Matching
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs
Seok-Wun Ha, Yong-Ho Moon
Chhagan Lal, M.S. Gaur, Vijay Laxmi
Open API and System of Short Messaging, Payment, Account Management based on RESTful Web Services
Minimizing Scheduling Delay for Multimedia in Xen Hypervisor
SunHwan Lim, JaeYong Lee, ByungChul Kim
Kyung Woo Hur, Jeong Gun Lee, Young Woong Ko
A Study on Advanced Object Tracking Algorithm Using Color Distribution and Feature Points
Efficient Allocation of Transmission Power and Rate in Multicarrier Code-Division Multiple-Access
Communications
Ye Hoon Lee
Hye-Youn Lim, Dae-Seong Kang
August 17 2011
Registration Open 09:30 ~
Coffee Break with Cookie
09:30~10:00
Conference Hall
Chair :
10:00~11:45
Title of Invited Talk #3
Inveted Speaker #3
Lunch Time
11:45~13:00
Sessions
13:00~15:00
13:00~13:15
13:15~13:30
13:30~13:45
13:45~14:00
14:00~14:15
14:15~14:30
14:30~14:45
14:45~15:00
Technical Session 41
Technical Session 42
Seminar Room A
Seminar Room B
Session Chair
Session Chair
ACN Part 2
Security and Application Part 2
A Social Education Network based on Location Sensing Information using smart-phones
Equivalent Key Recovery Attack on $H^2$-MAC Instantiated with MD5
Sook-Young Choi, Jang-Mook Kang
Wei Wang
API oriented Traffic Control in IMS/Web 2.0 era
GPU Implementation of the Keccak Hash Function Family
Daizo Ikeda, Toshihiro Suzuki, Akira Miura
Gerhard Hoffmann, Pierre-Louis Cayrel, Michael Schneider
Secure Data Aggregation in WSN Based Border Surveillance Systems
A comparative study of a new associative classification approach for mining rare and frequent classification rules
Suat Ozdemir
Ines Bouzouita, Samir Elloumi, Michel Liquiere, Ali Jaoua
Supervisory Control and Data Acquisition System CAIN Issues
Secret Key Awareness Security Public Key Encryption Scheme
Maricel O. Balitanas
Guoyan Zhang, Qiuliang Xu
Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis
Jayaprakash Kar
Lukas Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolar, Tomas Hruska, Karel Masarik, Alexander Meduna
Lower bounds for interpolating polynomials for square roots of the Elliptic Curve Discrete Logarithm
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review
Gerasimos Meletiou, Yannis Stamatiou, Apostolos Tsiakalos
Soltan Alharbi, Jens Weber-Jahnke, Issa Traore
Towards Next Generation System Architecture for Emergency Services
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems
Jari Veijalainen, Veikko Hara
Fabio Manganiello, Mirco Marchetti, Michele Colajanni
A Comparison of Link Layer Attacks on Wireless Sensor Networks
A DETRMINISTIC FACTORIZATION AND PRIMALITY TESTING ALGORITHM FOR INTEGERS OF THE
FORM Z mod 6 = -1
14:45~15:00
Shahriar Mohammadi, Hossein Jadidoleslamy
Noureldien Abdelrhman, Mahmoud Awadelkareem, Deiaeldien Ahmed
Coffee Break with Cookie
15:00~15:30
Sessions
15:30~17:30
15:30~15:45
15:45~16:00
16:00~16:15
16:15~16:30
16:30~16:45
16:45~17:00
17:00~17:15
17:15~17:30
Technical Session 51
Technical Session 52
Seminar Room A
Seminar Room B
Session Chair
Session Chair
ACN Part 3
Security and Application Part 3
Optical Character Recognition using Hu Seven Moments
An image authenticated encryption scheme based on chaotic maps
Anand Deshpande
Jing Qiu, Feng Liao, Di Xiao, Ping Wang
NETWORK RISK MANAGEMENT
Improved Differential Fault Analysis of Trivium
Jamil Asim, Umer Shafique
Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann
An algorithm for prediction of overhead messages in client-server based wireless networks
2SC: an Efficient Code-based Stream Cipher
Azeem Irshad, Muhammad Shafiq, Muhammad Shahzad, Muddessar Iqbal, Amjad Ali, Ashfaq Rahman,
Shahzada Khurram, Mushhad Gilani, Zafarullah Khan
Performance optimization of MTP Stack
Mohammed Meziani, Sidi Mohamed El Yousfi Alaoui
Greeshma Prakash, Dr.B.K Sujatha
Dan Wong
Forward DiffSig Scheme with MABS for Multicast Authentication
Improved identity-based identification and signature schemes using Quasi-Dyadic Goppa codes
RADHIKA R, KANNAN A, BOSE S, VIJAYAKUMAR P
Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani
Information security awareness campaign: An alternate approach
S-FSB: An Improved Variant of the FSB Hash Family
Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan
Mohammed Meziani, Dagdelen, Sidi Mohamed El Yousfi Alaoui
Recent progress in code-based cryptography
Towards Algebraic Cryptanalysis of HFE Challenge 2 Using MXL3
Pierre-Louis Cayrel, Mohamed El Yousfi Alaoui, Gerhard Hoffman, Mohammed Meziani, Robert Niebuhr
Mohamed Mohamed, Jintai Ding, Johannes Buchmann
A secure protocol for wireless routing
Download