Online Library TheLib.net » Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings

Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs.

CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications and will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows:

- Mobile and ubiquitous computing
- Dependable, reliable and autonomic computing
- Security and trust management
- Multimedia systems and services
- Networking and communications
- Database and data mining
- Game and software engineering
- Grid, cloud and scalable computing
- Embedded system and software
- Artificial intelligence
- Distributed and parallel algorithms
- Web and internet computing
- IT policy and business management

WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows:

- Cryptography and Security for Converged environments
- Wireless sensor network for Converged environments
- Multimedia for Converged environments
- Advanced Vehicular Communications Technology for Converged environments
- Human centric computing, P2P, Grid and Cloud computing for Converged environments
- U-Healthcare for Converged environments
- Strategic Security Management for Industrial Technology
- Advances in Artificial Intelligence and Surveillance Systems




Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs.

CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications and will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows:

- Mobile and ubiquitous computing
- Dependable, reliable and autonomic computing
- Security and trust management
- Multimedia systems and services
- Networking and communications
- Database and data mining
- Game and software engineering
- Grid, cloud and scalable computing
- Embedded system and software
- Artificial intelligence
- Distributed and parallel algorithms
- Web and internet computing
- IT policy and business management

WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows:

- Cryptography and Security for Converged environments
- Wireless sensor network for Converged environments
- Multimedia for Converged environments
- Advanced Vehicular Communications Technology for Converged environments
- Human centric computing, P2P, Grid and Cloud computing for Converged environments
- U-Healthcare for Converged environments
- Strategic Security Management for Industrial Technology
- Advances in Artificial Intelligence and Surveillance Systems




Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs.

CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications and will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows:

- Mobile and ubiquitous computing
- Dependable, reliable and autonomic computing
- Security and trust management
- Multimedia systems and services
- Networking and communications
- Database and data mining
- Game and software engineering
- Grid, cloud and scalable computing
- Embedded system and software
- Artificial intelligence
- Distributed and parallel algorithms
- Web and internet computing
- IT policy and business management

WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows:

- Cryptography and Security for Converged environments
- Wireless sensor network for Converged environments
- Multimedia for Converged environments
- Advanced Vehicular Communications Technology for Converged environments
- Human centric computing, P2P, Grid and Cloud computing for Converged environments
- U-Healthcare for Converged environments
- Strategic Security Management for Industrial Technology
- Advances in Artificial Intelligence and Surveillance Systems


Content:
Front Matter....Pages i-lv
Front Matter....Pages 1-1
A Large-Scale Terrain Rendering Method With GPU-Based Geometry Compression....Pages 3-9
Cots Sparse Matrix Utilization in Distribution Power Flow Applications....Pages 11-20
A New Graph-Based Algorithm for Persian Text Summarization....Pages 21-30
The Factors Affect User Behaviour in a Picture-Based User Authentication System: PixelPin....Pages 31-42
Analysis of Smartphone-Based Location Information....Pages 43-53
Dynamic Visualization for Sensing Information Based on Mobile Sensor Network....Pages 55-65
Model Driven Real-Time Power System Application Development Using Just-In-Time Compilation....Pages 67-80
An Efficient Distribution Sensitive Privacy for Real-Time Applications....Pages 81-91
DeSPoT: A Method for the Development and Specification of Policies for Trust Negotiation....Pages 93-104
Extended NIST Prime Family for Efficient Modular Reduction....Pages 105-111
High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol....Pages 113-120
Energy-Efficient Multi-Granularity Resource Reservations for Multimedia Services....Pages 121-133
Single Camera Vehicle Detection Using Edges and Bag-of-Features....Pages 135-143
A New BiGaussian Edge Filter....Pages 145-154
Self-Healing in Smart Distribution Networks Using Data Exchange Model and Reliable Multicast Protocol....Pages 155-165
Applying Event-Based Framework to Support Power System Integration....Pages 167-181
Utilizing Converged Networks for Green Network Operations....Pages 183-191
A Ring and Clustering Routing Scheme Based on Data Field in Sensor Network....Pages 193-201
A Case Study on Cooperative Real-time Quality Monitoring Service Utilizing Sensor Networks....Pages 203-210
High Availability Archive for Time-Based Data....Pages 211-219
Front Matter....Pages 1-1
A Multivariate Spatial Outlier Detection Method Based on Semantic Similarity....Pages 221-230
Cohesion Between Size of Commit and Type of Commit....Pages 231-239
Software Defect Prediction Using Transitive Dependencies on Software Dependency Graph....Pages 241-249
Test Case Generation for Classes in Objects-Oriented Programming Using Grammatical Evolution....Pages 251-257
An Efficient Access Control Scheme for Online Gaming Server....Pages 259-267
Performance Evaluation of a New Scheduling Algorithm in Data Grid Environment....Pages 269-280
A Novel Dynamic Replication Algorithm in Hierarchical Data Grid....Pages 281-293
Intelligent Application Migration within a Self-Provisioned Hybrid Cloud Environment....Pages 295-303
Multi-Band OFDM and OFDM Simulation Software Using MATLAB® Graphical User Interface....Pages 305-313
A Comparison on PSO Variants in Calculating HEPWM Switching Angles for a Cascaded H-Bridge Multilevel Inverter....Pages 315-323
A Hybrid Artificial Potential Field: Genetic Algorithm Approach to Mobile Robot Path Planning in Dynamic Environments....Pages 325-333
Energy-Constrained Scheduling for Weakly-Hard Real-Time Tasks on Multiprocessors....Pages 335-347
A New Software Process Model: The Insect Model....Pages 349-354
Improving Recommendations in Tag-Based Systems with Spectral Clustering of Tag Neighbors....Pages 355-364
Event-Centric Test Case Scripting Method for SOA Execution Environment....Pages 365-373
bQoS (Business QoS) Parameters for SOA Quality Rating....Pages 375-383
Business-Centric Test Assertion Model for SOA....Pages 385-393
A Classification of Model-Driven Approaches to Develop Semantic Web Service....Pages 395-404
A Conceptual Model Explaining IT/IS Usage Behavior....Pages 405-413
Offering a Conceptual Model of Technology Acceptance in e-Banking Based on the Customers’ Satisfaction and Trust....Pages 415-424
Front Matter....Pages 425-425
Architecture for Secure SCADA System Based on IF-MAP Scheme....Pages 427-435
Research on the Model of the Survivable Storage System (SSS) and Its Architecture....Pages 437-451
New Improved Impossible Differential Attack on Reduced-Round AES-128....Pages 453-461
Smart Space Model for Facilitating Dynamic Service Binding....Pages 463-473
Functionality Evaluation of Ubiquitous Service Ontology for Dynamic Service Composition....Pages 475-485
OO Divide and Conquer Pattern Suitable for Parallel, Grid and Cloud Computing....Pages 487-495
A Dynamic and Reliable Failure Detection and Failure Recovery Services in the Grid Systems....Pages 497-509
Vehicle Positioning Technology Using Infra-based Laser Scanner Sensors for Autonomous Driving Service....Pages 511-517
Security Manpower Scheduling for Smart Airports....Pages 519-527
A Study on Static Analysis Model of Mobile Application for Privacy Protection....Pages 529-540
Front Matter....Pages 541-541
China’s Industrial Policy: Focusing on the <12.5 Plan>....Pages 543-551
A Dual CPU Based Fault Tolerance Technique for Manufacturing System....Pages 553-560
The Survey of Quality Model for Software and System....Pages 561-568
Improvement of Retinex Algorithm for Backlight Image Efficiency....Pages 569-577
A User Authentication Method for M2M Environments....Pages 579-587
Test Driven Development of Model Transformation with Reusable Patterns....Pages 589-595
An Advanced E-learning System Using Web Services....Pages 597-605
A Study of Mobile Architecture Web Design for Virtual Ecology Learning System Using LED (Light-Emitting Diodes) Lights in Smart-Phone Environment....Pages 607-612
A Study on the Tag Performance Test for International Standards Using RFID Emulator....Pages 613-620
Front Matter....Pages 621-632
Simulation and Performance Analysis of Ad-hoc Networks Using NS-2 and NS-3 Simulators....Pages 633-633
A Comparison Study for Different Settings of Crossover and Mutation Rates Using WMN-GA Simulation System....Pages 635-641
A Survey on MANET Testbeds and Mobility Models....Pages 643-650
Evaluation of Wireless Sensor Networks for Multi Mobile Events Using Different Topologies, Protocols and Radio Propagation Models....Pages 651-657
Trustworthiness-Based Broadcast Protocols in Peer-to-Peer Overlay Networks....Pages 659-667
Energy Efficient Distributed Systems for Storage-Based Applications....Pages 669-675
Front Matter....Pages 677-683
Forged Region Detection for Scanned Images....Pages 685-685
Camcorder Identification for Heavily Compressed Low Resolution Videos....Pages 687-694
Block-based Image Authentication Algorithm Using Reversible Watermarking....Pages 695-701
Digital Forgery Detection Scheme Incorporating Imaging Device Characteristics Using Wiener Filter....Pages 703-711
Front Matter....Pages 713-721
Dynamic Multi-channel Multi-path Routing Protocol for Smart Grid....Pages 723-723
Speed and Surge Control for an Unmanned Aircraft Vehicle with Turbojet Engine....Pages 725-733
Influence of G729 Speech Coding on Automatic Speaker Recognition in VoIP Applications....Pages 735-743
Scheduling DAGs with Parallel Tasks in Multi-Clusters Based on Parallel Efficiency....Pages 745-751
Tomographic Reconstruction of a Multi-Attenuation Phantom by Means of Ultrasonic Method....Pages 753-760
A Healthcare Cloud Computing Strategic Planning Model....Pages 761-767
Front Matter....Pages 769-775
Multimedia Data Placement and Retrieval for Mobile Platform....Pages 777-777
A Platform-Independent Smartphone Application Development Framework....Pages 779-786
Energy-Efficient Scheduling for Mobile Sensor Networks with Renewable Energy Source....Pages 787-794
Issues and Challenges in Determining Quality of Service Requirements in Wired, Wireless and Mobile Networks....Pages 795-803
Front Matter....Pages 805-811
Implementation of the River Monitoring System Using Embedded RTU Server....Pages 777-777
A Study on Message Batch Verification Scheme Using Bloom Filter in VANET....Pages 813-819
Computing Text-to-Text Semantic Relatedness Based on Building and Analyzing Enriched Concept Graph....Pages 821-829
Back Matter....Pages 831-840
....Pages 841-843
Download the book Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen