Ebook: Advances in Intelligent Systems and Applications - Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012
- Tags: Computational Intelligence, Artificial Intelligence (incl. Robotics)
- Series: Smart Innovation Systems and Technologies 21
- Year: 2013
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:
l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:
l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:
l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
Content:
Front Matter....Pages 1-21
A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols....Pages 1-13
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols....Pages 15-23
An Extension of Harn-Lin’s Cheater Detection and Identification....Pages 25-32
Cryptanalysis on the User Authentication Scheme with Anonymity....Pages 33-39
Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections....Pages 41-51
A Novel Authentication Scheme Based on Torus Automorphism for Smart Card....Pages 53-60
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme....Pages 61-68
Impact of Identifier-Locator Split Mechanism on DDoS Attacks....Pages 69-78
Detecting Web-Based Botnets with Fast-Flux Domains....Pages 79-89
Improvements of Attack-Defense Trees for Threat Analysis....Pages 91-100
Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Using Commodity Hardware....Pages 101-109
Performance Evaluation on Permission-Based Detection for Android Malware....Pages 111-120
Image Steganography Using Gradient Adjacent Prediction in Side-Match Vector Quantization....Pages 121-129
A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions....Pages 131-139
Digital Watermarking Based on JND Model and QR Code Features....Pages 141-148
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme....Pages 149-158
A Threshold Secret Image Sharing with Essential Shadow Images....Pages 159-166
Theoretical Analysis and Realistic Implementation of Secure Servers Switching System....Pages 167-176
Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditing....Pages 177-184
Enhancing Cloud-Based Servers by GPU/CPU Virtualization Management....Pages 185-194
Controlled Quantum Secure Direct Communication Based on Single Photons....Pages 195-204
Construction of a Machine Guide Dog Using a Two-Mirror Omni-camera and an Autonomous Vehicle....Pages 205-219
Protection of Privacy-Sensitive Contents in Surveillance Videos Using WebM Video Features....Pages 221-233
A Study of Real-Time Hand Gesture Recognition Using SIFT on Binary Images....Pages 235-246
An Approach for Mouth Localization Using Face Feature Extraction and Projection Technique....Pages 247-257
Facial Expression Recognition Using Image Processing Techniques and Neural Networks....Pages 259-267
Search Space Reduction in Pedestrian Detection for Driver Assistance System Based on Projective Geometry....Pages 269-278
Fast Multi-path Motion Estimation Algorithm with Computation Scalability....Pages 279-288
Moving Objects Detection Based on Hysteresis Thresholding....Pages 289-298
Smart Video Camera Design – Real-Time Automatic Person Identification....Pages 299-309
A High Performance Parallel Graph Cut Optimization for Depth Estimation....Pages 311-320
An Interactive 3D Modeling System Based on Fingertip Tracking....Pages 321-329
Comprehensive Evaluation for HE Based Contrast Enhancement Techniques....Pages 331-338
Significance-Preserving-Guided Content-Aware Image Retargeting....Pages 339-348
Identifying Device Brand by Using Characteristics of Color Filter Array....Pages 349-358
Robust Video Copy Detection Based on Constrained Feature Points Matching....Pages 359-368
A Mass Detection System in Mammograms Using Grey Level Co-occurrence Matrix and Optical Density Features....Pages 369-376
Automatic Evaluation of Choroidal Neovascularization in Fluorescein Angiography....Pages 377-382
3D Spinal Cord and Nerves Segmentation from STIR-MRI....Pages 383-392
Speeding Up the Decisions of Quad-Tree Structures and Coding Modes for HEVC Coding Units....Pages 393-401
Optimal GOP Size of H.264/AVC Temporal Scalable Coding....Pages 403-412
Motion Estimation and DCT Coding Combined Scheme for H.264/AVC Codec....Pages 413-421
Free View Point Real-Time Monitor System Based on Harris-SURF....Pages 423-430
Virtual Multiple-Perspective Display Using Pyramidal or Conical Showcase....Pages 431-438
Stroke Rehabilitation via a Haptics-Enhanced Virtual Reality System....Pages 439-453
Image-Based Wearable Tangible Interface....Pages 455-464
The Creation of V-fold Animal Pop-Up Cards from 3D Models Using a Directed Acyclic Graph....Pages 465-475
MagMobile: Enhancing Social Interactions with Rapid View-Stitching Games of Mobile Devices....Pages 477-486
Computer-Vision Based Hand Gesture Recognition and Its Application in Iphone....Pages 487-497
An Adaptive Video Program Recommender Based on Group User Profiles....Pages 499-509
Automatic Dancing Assessment Using Kinect....Pages 511-520
A New View-Calibrated Approach for Abnormal Gait Detection....Pages 521-529
Modeling and Recognizing Action Contexts in Persons Using Sparse Representation....Pages 531-541
Efficient Parallel Knuth-Morris-Pratt Algorithm for Multi-GPUs with CUDA....Pages 543-552
Energy-Efficient Scheduling Based on Reducing Resource Contention for Multi-core Processors....Pages 553-562
Effective Processor Allocation for Moldable Jobs with Application Speedup Model....Pages 563-572
Correctness of Self-stabilizing Algorithms under the Dolev Model When Adapted to Composite Atomicity Models....Pages 573-586
Efficiently Extracting Change Data from Column Oriented NoSQL Databases....Pages 587-598
Approaches for Data Synchronization on Mobile Peer-to-Peer Networks....Pages 599-608
On the Design of a Load Balancing Mechanism for ALE Middleware....Pages 609-618
Platform-as-a-Service Architecture for Parallel Video Analysis in Clouds....Pages 619-626
A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function....Pages 627-636
Low Power Compiler Optimization for Pipelining Scaling....Pages 637-646
An Editing System Converting a UML State Diagram to a PLC Program....Pages 647-655
Accurate Instruction-Level Alias Analysis for ARM Executable Code....Pages 657-667
A Two-Leveled Web Service Path Re-planning Technique....Pages 669-679
An Effective Flood Forecasting System Based on Web Services....Pages 681-690
A Simulation Environment for Studying the Interaction Process between a Human and an Embedded Control System....Pages 691-699
A Flexible and Re-configurable Service Platform for Multi-user Mobile Games....Pages 701-710
High-Performance 128-Bit Comparator Based on Conditional Carry-Select Scheme....Pages 711-720
A Multiplier-Free Noise Trapped Touch Algorithm for Low Cost 4x4 Matrix Panel Design....Pages 721-730
Design of a Dynamic Parallel Execution Architecture for Multi-core Systems....Pages 731-740
A Distributed Run-Time Dynamic Data Manager for Multi-core System Parallel Execution....Pages 741-750
A Novel Defragmemtable Memory Allocating Schema for MMU-Less Embedded System....Pages 751-757
Hardware Acceleration Design for Embedded Operating System Scheduling....Pages 759-767
Asynchronous Ring Network Mechanism with a Fair Arbitration Strategy for Network on Chip....Pages 769-777
Energy-Aware Compiler Optimization for VLIW-DSP Cores....Pages 779-788
On the Variants of Tagged Geometric History Length Branch Predictors....Pages 789-807
Back Matter....Pages 0--1
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:
l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
Content:
Front Matter....Pages 1-21
A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols....Pages 1-13
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols....Pages 15-23
An Extension of Harn-Lin’s Cheater Detection and Identification....Pages 25-32
Cryptanalysis on the User Authentication Scheme with Anonymity....Pages 33-39
Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections....Pages 41-51
A Novel Authentication Scheme Based on Torus Automorphism for Smart Card....Pages 53-60
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme....Pages 61-68
Impact of Identifier-Locator Split Mechanism on DDoS Attacks....Pages 69-78
Detecting Web-Based Botnets with Fast-Flux Domains....Pages 79-89
Improvements of Attack-Defense Trees for Threat Analysis....Pages 91-100
Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Using Commodity Hardware....Pages 101-109
Performance Evaluation on Permission-Based Detection for Android Malware....Pages 111-120
Image Steganography Using Gradient Adjacent Prediction in Side-Match Vector Quantization....Pages 121-129
A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions....Pages 131-139
Digital Watermarking Based on JND Model and QR Code Features....Pages 141-148
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme....Pages 149-158
A Threshold Secret Image Sharing with Essential Shadow Images....Pages 159-166
Theoretical Analysis and Realistic Implementation of Secure Servers Switching System....Pages 167-176
Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditing....Pages 177-184
Enhancing Cloud-Based Servers by GPU/CPU Virtualization Management....Pages 185-194
Controlled Quantum Secure Direct Communication Based on Single Photons....Pages 195-204
Construction of a Machine Guide Dog Using a Two-Mirror Omni-camera and an Autonomous Vehicle....Pages 205-219
Protection of Privacy-Sensitive Contents in Surveillance Videos Using WebM Video Features....Pages 221-233
A Study of Real-Time Hand Gesture Recognition Using SIFT on Binary Images....Pages 235-246
An Approach for Mouth Localization Using Face Feature Extraction and Projection Technique....Pages 247-257
Facial Expression Recognition Using Image Processing Techniques and Neural Networks....Pages 259-267
Search Space Reduction in Pedestrian Detection for Driver Assistance System Based on Projective Geometry....Pages 269-278
Fast Multi-path Motion Estimation Algorithm with Computation Scalability....Pages 279-288
Moving Objects Detection Based on Hysteresis Thresholding....Pages 289-298
Smart Video Camera Design – Real-Time Automatic Person Identification....Pages 299-309
A High Performance Parallel Graph Cut Optimization for Depth Estimation....Pages 311-320
An Interactive 3D Modeling System Based on Fingertip Tracking....Pages 321-329
Comprehensive Evaluation for HE Based Contrast Enhancement Techniques....Pages 331-338
Significance-Preserving-Guided Content-Aware Image Retargeting....Pages 339-348
Identifying Device Brand by Using Characteristics of Color Filter Array....Pages 349-358
Robust Video Copy Detection Based on Constrained Feature Points Matching....Pages 359-368
A Mass Detection System in Mammograms Using Grey Level Co-occurrence Matrix and Optical Density Features....Pages 369-376
Automatic Evaluation of Choroidal Neovascularization in Fluorescein Angiography....Pages 377-382
3D Spinal Cord and Nerves Segmentation from STIR-MRI....Pages 383-392
Speeding Up the Decisions of Quad-Tree Structures and Coding Modes for HEVC Coding Units....Pages 393-401
Optimal GOP Size of H.264/AVC Temporal Scalable Coding....Pages 403-412
Motion Estimation and DCT Coding Combined Scheme for H.264/AVC Codec....Pages 413-421
Free View Point Real-Time Monitor System Based on Harris-SURF....Pages 423-430
Virtual Multiple-Perspective Display Using Pyramidal or Conical Showcase....Pages 431-438
Stroke Rehabilitation via a Haptics-Enhanced Virtual Reality System....Pages 439-453
Image-Based Wearable Tangible Interface....Pages 455-464
The Creation of V-fold Animal Pop-Up Cards from 3D Models Using a Directed Acyclic Graph....Pages 465-475
MagMobile: Enhancing Social Interactions with Rapid View-Stitching Games of Mobile Devices....Pages 477-486
Computer-Vision Based Hand Gesture Recognition and Its Application in Iphone....Pages 487-497
An Adaptive Video Program Recommender Based on Group User Profiles....Pages 499-509
Automatic Dancing Assessment Using Kinect....Pages 511-520
A New View-Calibrated Approach for Abnormal Gait Detection....Pages 521-529
Modeling and Recognizing Action Contexts in Persons Using Sparse Representation....Pages 531-541
Efficient Parallel Knuth-Morris-Pratt Algorithm for Multi-GPUs with CUDA....Pages 543-552
Energy-Efficient Scheduling Based on Reducing Resource Contention for Multi-core Processors....Pages 553-562
Effective Processor Allocation for Moldable Jobs with Application Speedup Model....Pages 563-572
Correctness of Self-stabilizing Algorithms under the Dolev Model When Adapted to Composite Atomicity Models....Pages 573-586
Efficiently Extracting Change Data from Column Oriented NoSQL Databases....Pages 587-598
Approaches for Data Synchronization on Mobile Peer-to-Peer Networks....Pages 599-608
On the Design of a Load Balancing Mechanism for ALE Middleware....Pages 609-618
Platform-as-a-Service Architecture for Parallel Video Analysis in Clouds....Pages 619-626
A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function....Pages 627-636
Low Power Compiler Optimization for Pipelining Scaling....Pages 637-646
An Editing System Converting a UML State Diagram to a PLC Program....Pages 647-655
Accurate Instruction-Level Alias Analysis for ARM Executable Code....Pages 657-667
A Two-Leveled Web Service Path Re-planning Technique....Pages 669-679
An Effective Flood Forecasting System Based on Web Services....Pages 681-690
A Simulation Environment for Studying the Interaction Process between a Human and an Embedded Control System....Pages 691-699
A Flexible and Re-configurable Service Platform for Multi-user Mobile Games....Pages 701-710
High-Performance 128-Bit Comparator Based on Conditional Carry-Select Scheme....Pages 711-720
A Multiplier-Free Noise Trapped Touch Algorithm for Low Cost 4x4 Matrix Panel Design....Pages 721-730
Design of a Dynamic Parallel Execution Architecture for Multi-core Systems....Pages 731-740
A Distributed Run-Time Dynamic Data Manager for Multi-core System Parallel Execution....Pages 741-750
A Novel Defragmemtable Memory Allocating Schema for MMU-Less Embedded System....Pages 751-757
Hardware Acceleration Design for Embedded Operating System Scheduling....Pages 759-767
Asynchronous Ring Network Mechanism with a Fair Arbitration Strategy for Network on Chip....Pages 769-777
Energy-Aware Compiler Optimization for VLIW-DSP Cores....Pages 779-788
On the Variants of Tagged Geometric History Length Branch Predictors....Pages 789-807
Back Matter....Pages 0--1
....