August 15 2011 Registration Open 08:50 ~ Coffee Break with Cookie 09:00~09:30 Sessions 09:30~11:30 09:30~09:45 Technical Session 1 Technical Session 2 Technical Session 3 Seminar Room A Seminar Room B Seminar Room C Robert Young Chul Kim Suwon Park Dong Hwa Kim AFIT 2011 EECN 2011 A Study on Test Case Generation based on State Diagram in Modeling & An efficient sleep mode procedure for IEEE 802.16e femtocell base station Simulation Environment Woo Yeol Kim, Hyun Seung Son, and Robert Young Chul Kim Sujin Kwon, Young-uk Chung, and Yong-Hoon Choi Real-Time Intelligent Home Network Control System 09:45~10:00 10:00~10:15 Yong-Soo Kim LCN: Largest Neighbor nodes based Routing for Delay and Disruption Tolerant Mobile Networks Doo-Ok Seo, Gwang-Hyun Kim, Dong-Ho Lee A Perspective of Domestic Appstores compared with Global Appstores 10:15~10:30 10:30~10:45 10:45~11:00 11:00~11:15 11:15~11:30 Byungkook Jeon HuCare 2011 Fault Tolerance Multi-Agents for MHAP Environment: FTMA SoonGohn Kim, Eung Nam Ko Performance Analysis of Wireless LANs with a Backoff Freezing Effective Method Tailoring in Construction of Medical Information System Mechanism Ho Young Hwang, Seong Joon Kim, Byung-Soo Kim, Dan Keun Sung, and WonYoung Choi, SoonGohn Kim Suwon Park Energy Saving Method for Wi-Fi Stations Based on Partial Virtual Bitmap Integrated Retrieval System for Rehabilitation Medical Equipment in Distributed DB Environments Sangmin Moon, Taehyu Shin, Suwon Park, Hyunseok Lee, Chae Bong BokHee Jung, ChangKeun Lee, SoonGohn Kim Sohn, Young-uk Chung, Ho Young Hwang Performance Analysis of Forward link Transmit Power Control during Soft An fMRI study of reading different word form Handoff in Mobile Cellular Systems Jin Kim, Suwon Park, Hyunseok Lee, Hyuk-jun Oh Hyo Woon Yoon, Ji-Hyang Lim A Design of Retrieval System for Presentation Documents Using ContentBased Image Retrieval Hongro Lee, Kwangnam Choi, Kiseok Choi, Jaesoo Kim A Handover Scheme for Improving Throughput Using Vehicle’s Moving Path Information Sang Hyuck Han, Suwon Park, Yong-Hoon Choi Systematic Design of Context Awareness Mobile Learning Environment Data Quality Management based Data Profiling in e-Government Environments Youn-Gyou Kook, Joon Lee, Min-Woo Park, Ki-Seok Choi, Jae-Soo Kim, Soung-Soo Shin Design of Code Template for Automatic Code Generation of Heterogeneous Smartphone Application Woo Yeol Kim, Hyun Seung Son, and Robert Young Chul Kim Performance Improvement Method for WiFi Networks Sharing Spectrum Intelligent Feature Selection by Bacterial Foraging Algorithm and Information Theory Jae Hoon Cho, Dong Hwa Kim Jongwoo Kim, Suwon Park, Seung Hyong Rhee, Yong-Hoon Choi, HoYoung Hwang, Young-uk Chung Effects of the Location of APs on Positioning Error in RSS value based Scheme Hyeonmu Jeon, Uk-Jo, Mingyu-Jo, Nammoon Kim, Yongok Kim The intelligent video and audio recognition black-box system of the elevator for the disaster and crime prevention Woon-Yong Kim, Seok-Gyu Park, Moon-Cheol Lim 11:30~11:50 Welcome Ceremony 11:50~13:00 Lunch Time Ki-Sang Song, JongHwa Park, JaeKyung Kim A Study on the Access Control Module of Linux Secure Operating System JinSeok Park, SoonGohn Kim Sessions 13:00~15:00 13:00~13:15 13:15~13:30 13:30~13:45 13:45~14:00 Technical Session 11 Technical Session 12 Technical Session 13 Seminar Room A Seminar Room B Seminar Room C Session Chair Session Chair Session Chair IWIT 2011 Part 1 IWIT 2011 Part 2 IWIT 2011 Part 3 Vehicle Tracking Based on Kalman Filter in Tunnel An Efficient Private Registry Management System using DHT based on FIPA Agent Platform Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Name and Dong-Ryeol Shin Topology Configuration for Effective In-Ship Network Construction A study for security scheme and the right to be forgotten based on social network service for smart-phone environment Jang-Mook Kang, You-Jin Song, Jae-sang Cha, Seon-hee Lee Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu Distributed Color Tracker for Remote Robot Applications and Simulation Environment Yong-Ho Seo Interference Analysis of Digital HD Radio System considering Angular Effect Jooseok Kim, Wonho Jung, Kyungseok Kim Mi-Jin Kim, Jong-Wook Jang Development of Integrated Adapter Based on Multi-Sensor Networks for Tracking and Surveillance Jun-Pil Boo, Do-Hyeun Kim The Realization of Monitoring System for Patient’ History Using RFID and Embedded Linux Heung-kuk Jo A study on dynamic gateway system for MOST GATEWAY Scheduling Algorithm Seong-Jin Jang, Jong-Wook Jang The Contents based Music Retrieval Method using Audio Feature Analysis A Seamless Inter-LMA Handoffs Scheme Based on 2-Layer in Hierarchical against Polyphonic Music Proxy Mobile IPv6 Networks Chai-Jong Song, Seok-Pil Lee, Hochong Park Jongpil Jeong, Dong Ryeol Shin, Seunghyun Lee and Jaesang Cha Implement smart blackbox system with OBD-II, MOST networks Sung-Hyun Baek, Jong-Wook Jang Mobile Robot Control using Smart Phone and its Performance Evaluation A study for method of construct encryption scheme for supporting range query based on Bucket ID Transformation about Sensor Applications A study for LED (light-emitting diode) applied with Algorithm based on Emotion Processing Scheme using Social Network Service Yong-Ho Seo, Seong-Sin Kwak and Tae-Kyu Yang You-Jin Song, Jaesang Cha, Jang-Mook Kang Jang-Mook Kang, Jae-Sang Cha, You-Jin Song, Jeong-Jin Kang, JinYoung Kim, Yeong-Min Jang SPECTRAL DIMENSIONALITY REDUCTION BASED ON BISPECTRUM PHASE FOR HYPERSPECTRAL IMAGE CLASSIFICATION Khairul Muzzammil Saipullah and Deok-Hwan Kim 14:00~14:15 14:15~14:30 14:30~14:45 14:45~15:00 A Noise Robust Echo Canceller with Post-Processing using Liner Predictor Improvement of Message Processing Method for SOA based Digital Setand Wiener Filter top Box system Hyuntae Kim C26, Daehyun Ryu, Jangsik Park Ji-Yeon Hwang, Seung-Jung Shin, Dae-Hyun Ryu Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor Jangsik Park, Hyuntae Kim, Yunsik Yu A Data Management Method to Secure Data in Cloud Computing Environment You-Jin Song, Jae-sang Cha, Jang-Mook Kang, Wan-sik Kim High Speed and Low-complexity Mode Decision for Advanced Video Coding Byoungman An, Youngseop Kim, Oh-Jin Kwon Study on Data transmission using MediaLB Communication in Vehicle Network Chang-Young Kim, Jong-Wook Jang VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication A Fast and Secure Method to Preserve Anonymity for Electronic Voting Dongjae Song, Soongyu Kwon, Chun-Guan Kim, and Jong Tae Kim Hyungkyu Yang, Yunho Lee, and Younghwa An Coffee Break with Cookie 15:00~15:30 Sessions 15:30~17:30 15:30~15:45 Technical Session 21 Technical Session 22 Technical Session 23 Seminar Room A Seminar Room B Seminar Room C Session Chair Session Chair Session Chair IWIT 2011 Part 4 IWIT 2011 Part 5 IWIT 2011 Part 6 A scheme for Emotion Communication System using LED (light-emitting diodes) Lights blending or mixing RGB Colors Jang-Mook Kang, Jae-Sang Cha Vessel Tracking Using Adaboost Algorithm and AIS Information Developing two Dimensional Film Speaker using Piezoelectric Materials Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu Keehong Um, Jeong-Jin Kang Robust Congestion Control Design for Input Time Delayed AQM System 15:45~16:00 16:00~16:15 An Extended Could Computing Architecture for Immediate Sharing of Avionic Contents Doo-Hyun Kim, Seunghwa Song, Seung-Jung Shin, and Neungsoo Park Experimental Performance Evaluation of Neural Network and Logistic Regression Model for Heart Disease Prediction Yong-Gyu Jung Security Weaknesses of Remote User Authentication Scheme Preserving User Anonymity Young-Hwa An and Hyungkyu Yang Cache Performance Analysis for Block Size Selection Prototype implementation of the Direct3D-on-OpenGL library Neungsoo Park Joo-Young Do, Nakhoon Baek, Kwan-Hee Yoo An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram Real time music retrieval based on GPGPU Performance Analysis of HDD and DRAM-SSD using TPC-H Benchmark on MYSQL Dong-Sung Ryu, Kwang-Hwi Kim, Hwan-Gue Cho Sang-il Lee, Kyoungro Yoon, Neungsoo Park Song Hyun-Ju, Lee Younghun, Cheong Seung-Kook Requiremets analysis and critical requirement derivation method using Macrostruktur Yong-Kyun Cho and Young-Bum Park Relative Self-Localization Base on Fish-eye Lenses and SIFT Algorithm for Indoor Mobile Robot Xing Xiongand Byung-Jae Choi User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Ji Hoon Yang, Seung Jung Shin, Dong Kyun Lim, Jeong Jin Kang 16:15~16:30 16:30~16:45 16:45~17:00 17:00~17:15 17:15~17:30 A scheme for Role-Based 3D CCTV using CS-RBAC (Context-Sensitivity User-Oriented Pseudo Biometric Image Based One-Time Password Role-Based Access Control) Mechanism on Smart Phone Jang-Mook Kang, Jae-Sang Cha, You-Jin Song, Goo-Man Park, EunWonjun Jang, Sikwan Cho, Hyung-Woo Lee Young Ko Myong-chul Shin, Jeong-Jin Kang, You-Sik Hong Adapting Model Transformation Approach for Android Smartphone Implementation of Switching Driving Module with ATmega16 processor Application based on Visible LED Communication System Woo Yeol Kim, Hyun Seung Son, Jae Seung Kim, and Robert Young Chul Geun-Bin Hong, Tae-Su Jang and Yong K. Kim Kim Implementation of a Volume Controller for Considering Hearing Loss in A Performance Evaluation on the Broadcasting Scheme for Mobile Ad-hoc Bluetooth Headset Networks Hyuntae Kim, Daehyun Ryu, Jangsik Park Kwan-Woong Kim, Tae-Su Jang and Yong K. Kim Context Model Based on Ontology in Mobile Cloud Computing Changbok Jang, Euiin Choi SPECC - A New Technique for Direction of Arrival Estimation In-Sik Choi August 16 2011 Registration Open 09:30 ~ Coffee Break with Cookie 09:30~10:00 Conference Hall Chair : 10:00~11:45 Title of Invited Talk #1 Inveted Speaker #1 Lunch Time 11:45~13:15 Conference Hall Chair : 13:15~15:00 Title of Invited Talk #2 Inveted Speaker #2 Coffee Break with Cookie 15:00~15:30 Sessions 15:30~17:30 15:30~15:45 15:45~16:00 16:00~16:15 16:15~16:30 Technical Session 31 Technical Session 32 Seminar Room A Seminar Room B Session Chair Session Chair ACN Part 1 Security and Application Part 1 Clock Synchronization for One-Way Delay Measurement : A Survey Mapping based on Three Cameras for 3D face Modeling Minsu Shin, Mankyu Park, Deockgil Oh, Byungchul Kim, Jaeyong Lee Jae-gu Song, Seoksoo Kim Analysis of the Characteristics of EEG caused by Dyspnea and the Influence of the Environmental Factors Privacy Reference Architecture for Personal Information Life Cycle Jeong-Hoon Shin Yongnyuo Shin, Woobong Chun, Hongsoon Jung A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment Forward DiffSig Scheme with MABS for Multicast Authentication Sungmo Jung, Jong Hyun Kim, Seoksoo Kim RADHIKA R, KANNAN A, BOSE S, VIJAYAKUMAR P Retrofit to CAIN of IP-based Supervisory Control and Data Acquisition System Face Recognition: PCA VS. 2DPCA Maricel O. Balitanas Anand Deshpande 16:30~16:45 16:45~17:00 17:00~17:15 17:15~17:30 A Quality of Service Algorithm to Reduce Jitter in Mobile Networks An image authenticated encryption scheme based on chaotic maps P. Calduwel Newton Jing Qiu, Xiaofeng Liao, Di Xiao, Ping Wang Multiple Object Tracking using SIFT Features and Location Matching A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs Seok-Wun Ha, Yong-Ho Moon Chhagan Lal, M.S. Gaur, Vijay Laxmi Open API and System of Short Messaging, Payment, Account Management based on RESTful Web Services Minimizing Scheduling Delay for Multimedia in Xen Hypervisor SunHwan Lim, JaeYong Lee, ByungChul Kim Kyung Woo Hur, Jeong Gun Lee, Young Woong Ko A Study on Advanced Object Tracking Algorithm Using Color Distribution and Feature Points Efficient Allocation of Transmission Power and Rate in Multicarrier Code-Division Multiple-Access Communications Ye Hoon Lee Hye-Youn Lim, Dae-Seong Kang August 17 2011 Registration Open 09:30 ~ Coffee Break with Cookie 09:30~10:00 Conference Hall Chair : 10:00~11:45 Title of Invited Talk #3 Inveted Speaker #3 Lunch Time 11:45~13:00 Sessions 13:00~15:00 13:00~13:15 13:15~13:30 13:30~13:45 13:45~14:00 14:00~14:15 14:15~14:30 14:30~14:45 14:45~15:00 Technical Session 41 Technical Session 42 Seminar Room A Seminar Room B Session Chair Session Chair ACN Part 2 Security and Application Part 2 A Social Education Network based on Location Sensing Information using smart-phones Equivalent Key Recovery Attack on $H^2$-MAC Instantiated with MD5 Sook-Young Choi, Jang-Mook Kang Wei Wang API oriented Traffic Control in IMS/Web 2.0 era GPU Implementation of the Keccak Hash Function Family Daizo Ikeda, Toshihiro Suzuki, Akira Miura Gerhard Hoffmann, Pierre-Louis Cayrel, Michael Schneider Secure Data Aggregation in WSN Based Border Surveillance Systems A comparative study of a new associative classification approach for mining rare and frequent classification rules Suat Ozdemir Ines Bouzouita, Samir Elloumi, Michel Liquiere, Ali Jaoua Supervisory Control and Data Acquisition System CAIN Issues Secret Key Awareness Security Public Key Encryption Scheme Maricel O. Balitanas Guoyan Zhang, Qiuliang Xu Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis Jayaprakash Kar Lukas Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolar, Tomas Hruska, Karel Masarik, Alexander Meduna Lower bounds for interpolating polynomials for square roots of the Elliptic Curve Discrete Logarithm The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review Gerasimos Meletiou, Yannis Stamatiou, Apostolos Tsiakalos Soltan Alharbi, Jens Weber-Jahnke, Issa Traore Towards Next Generation System Architecture for Emergency Services Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems Jari Veijalainen, Veikko Hara Fabio Manganiello, Mirco Marchetti, Michele Colajanni A Comparison of Link Layer Attacks on Wireless Sensor Networks A DETRMINISTIC FACTORIZATION AND PRIMALITY TESTING ALGORITHM FOR INTEGERS OF THE FORM Z mod 6 = -1 14:45~15:00 Shahriar Mohammadi, Hossein Jadidoleslamy Noureldien Abdelrhman, Mahmoud Awadelkareem, Deiaeldien Ahmed Coffee Break with Cookie 15:00~15:30 Sessions 15:30~17:30 15:30~15:45 15:45~16:00 16:00~16:15 16:15~16:30 16:30~16:45 16:45~17:00 17:00~17:15 17:15~17:30 Technical Session 51 Technical Session 52 Seminar Room A Seminar Room B Session Chair Session Chair ACN Part 3 Security and Application Part 3 Optical Character Recognition using Hu Seven Moments An image authenticated encryption scheme based on chaotic maps Anand Deshpande Jing Qiu, Feng Liao, Di Xiao, Ping Wang NETWORK RISK MANAGEMENT Improved Differential Fault Analysis of Trivium Jamil Asim, Umer Shafique Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann An algorithm for prediction of overhead messages in client-server based wireless networks 2SC: an Efficient Code-based Stream Cipher Azeem Irshad, Muhammad Shafiq, Muhammad Shahzad, Muddessar Iqbal, Amjad Ali, Ashfaq Rahman, Shahzada Khurram, Mushhad Gilani, Zafarullah Khan Performance optimization of MTP Stack Mohammed Meziani, Sidi Mohamed El Yousfi Alaoui Greeshma Prakash, Dr.B.K Sujatha Dan Wong Forward DiffSig Scheme with MABS for Multicast Authentication Improved identity-based identification and signature schemes using Quasi-Dyadic Goppa codes RADHIKA R, KANNAN A, BOSE S, VIJAYAKUMAR P Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani Information security awareness campaign: An alternate approach S-FSB: An Improved Variant of the FSB Hash Family Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan Mohammed Meziani, Dagdelen, Sidi Mohamed El Yousfi Alaoui Recent progress in code-based cryptography Towards Algebraic Cryptanalysis of HFE Challenge 2 Using MXL3 Pierre-Louis Cayrel, Mohamed El Yousfi Alaoui, Gerhard Hoffman, Mohammed Meziani, Robert Niebuhr Mohamed Mohamed, Jintai Ding, Johannes Buchmann A secure protocol for wireless routing