Online Library TheLib.net » Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012
cover of the book Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012

Ebook: Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012

00
27.01.2024
0
0

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.




ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.


ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.
Content:
Front Matter....Pages 1-23
Implementing Business/IT Projects Alignment through the Project Portfolio Approval Process....Pages 1-8
A Design of IoT Based Agricultural Zone Management System....Pages 9-14
A Design of Plant Factory Environment Control System....Pages 15-20
A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up Services....Pages 21-27
Adaptive Auto Bias Control in Wireless Communication Systems....Pages 29-34
Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan Moxibustion....Pages 35-40
Wound Healing Effect by 633 nm Wavelength Using LED Irradiator....Pages 41-46
Development and Evaluation of an In-Vehicle Haptic Navigation System....Pages 47-53
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks....Pages 55-61
Natural Language Processing for Modeling Stable Writing Characteristics of Users....Pages 63-70
Electronic Cane Usability for Visually Impaired People....Pages 71-78
Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance Function....Pages 79-86
3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured Light....Pages 87-93
Adaptive Resource Control Strategy over Cognitive Networks for Multimedia Services....Pages 95-102
Towards a Trusted Vehicular Routing in VANET....Pages 103-117
Forensic Analysis of Digsby Log Data to Trace Suspected User Activities....Pages 119-126
SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems....Pages 127-133
Data Consistency for Self-acting Load Balancing of Parallel File System....Pages 135-143
Isomorphism Classes of Jacobi Quartic Curve over Finite Fields....Pages 145-153
Fingerprinting Data Based on Secret Mask....Pages 155-162
Packet-Based Quality Measurement and Analysis for Mobile VoIP Service....Pages 163-170
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone....Pages 171-178
Email Encryption System Using Certificateless Public Key Encryption Scheme....Pages 179-186
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent....Pages 187-195
Methodology for Digital Forensic Investigation of iCloud....Pages 197-206
Analysis Framework to Detect Artifacts of Portable Web Browser....Pages 207-214
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET....Pages 215-223
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity....Pages 225-231
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment....Pages 233-240
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device....Pages 241-247
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student’s Harmful Contents....Pages 249-256
Elementary Education of Creativity Improvement Using Rube Goldberg’s Invention....Pages 257-263
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in U-Sensor Network Era....Pages 265-271
Security Balancing for IT-Enabled Service Innovation....Pages 273-277
The Electronic Bidding System Based on Public Key Infrastructure....Pages 279-283
High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement....Pages 285-291
Back Matter....Pages 0--1


ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.
Content:
Front Matter....Pages 1-23
Implementing Business/IT Projects Alignment through the Project Portfolio Approval Process....Pages 1-8
A Design of IoT Based Agricultural Zone Management System....Pages 9-14
A Design of Plant Factory Environment Control System....Pages 15-20
A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up Services....Pages 21-27
Adaptive Auto Bias Control in Wireless Communication Systems....Pages 29-34
Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan Moxibustion....Pages 35-40
Wound Healing Effect by 633 nm Wavelength Using LED Irradiator....Pages 41-46
Development and Evaluation of an In-Vehicle Haptic Navigation System....Pages 47-53
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks....Pages 55-61
Natural Language Processing for Modeling Stable Writing Characteristics of Users....Pages 63-70
Electronic Cane Usability for Visually Impaired People....Pages 71-78
Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance Function....Pages 79-86
3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured Light....Pages 87-93
Adaptive Resource Control Strategy over Cognitive Networks for Multimedia Services....Pages 95-102
Towards a Trusted Vehicular Routing in VANET....Pages 103-117
Forensic Analysis of Digsby Log Data to Trace Suspected User Activities....Pages 119-126
SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems....Pages 127-133
Data Consistency for Self-acting Load Balancing of Parallel File System....Pages 135-143
Isomorphism Classes of Jacobi Quartic Curve over Finite Fields....Pages 145-153
Fingerprinting Data Based on Secret Mask....Pages 155-162
Packet-Based Quality Measurement and Analysis for Mobile VoIP Service....Pages 163-170
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone....Pages 171-178
Email Encryption System Using Certificateless Public Key Encryption Scheme....Pages 179-186
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent....Pages 187-195
Methodology for Digital Forensic Investigation of iCloud....Pages 197-206
Analysis Framework to Detect Artifacts of Portable Web Browser....Pages 207-214
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET....Pages 215-223
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity....Pages 225-231
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment....Pages 233-240
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device....Pages 241-247
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student’s Harmful Contents....Pages 249-256
Elementary Education of Creativity Improvement Using Rube Goldberg’s Invention....Pages 257-263
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in U-Sensor Network Era....Pages 265-271
Security Balancing for IT-Enabled Service Innovation....Pages 273-277
The Electronic Bidding System Based on Public Key Infrastructure....Pages 279-283
High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement....Pages 285-291
Back Matter....Pages 0--1
....
Download the book Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012 for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen