Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711134
Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee
As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.
{"title":"Online banking authentication system using mobile-OTP with QR-code","authors":"Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711134","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711134","url":null,"abstract":"As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711162
Xu Shuhong
Analyzing investment efficiency of rural infrastructure is an important way to further exploit investment capacity and optimize resources distribution. On the basis of expounding basic principles of Malmquist-DEA, it chooses panel data in 1990–2007, and then measures and analysis the 29 DMUs' changes of TE, TP, PTE and SE, in order to improve investment efficiency of rural infrastructure in the east-central-west regions and further resolve the “Agriculture, Countryside and Farmer” issues.
{"title":"Research on 29 DMUs rural infrastructure investment efficiency using Malmquist-DEA method","authors":"Xu Shuhong","doi":"10.1109/ICCIT.2010.5711162","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711162","url":null,"abstract":"Analyzing investment efficiency of rural infrastructure is an important way to further exploit investment capacity and optimize resources distribution. On the basis of expounding basic principles of Malmquist-DEA, it chooses panel data in 1990–2007, and then measures and analysis the 29 DMUs' changes of TE, TP, PTE and SE, in order to improve investment efficiency of rural infrastructure in the east-central-west regions and further resolve the “Agriculture, Countryside and Farmer” issues.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711095
Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan
In Recent years embedded world has been undergoing a shift from traditional single-core processors to processors with multiple cores. However, this shift poses a challenge of adapting legacy uniprocessor-oriented real-time operating system (RTOS) to exploit the capability of multi-core processor. In addition, some embedded systems are inevitably going towards the direction of integrating real-time with off-the-shelf time-sharing system, as the combination of the two has the potential to provide not only timely and deterministic response but also a large application base. Virtualization technology, which ensures strong isolation between virtual machines, is therefore a promising solution to above mentioned issues. However, there remains a concern regarding the responsiveness of the RTOS running on top of a virtual machine. In this paper we propose an embedded real-time virtualization architecture based on Kernel-Based Virtual Machine (KVM), in which VxWorks and Linux are combined together. We then analyze and evaluate how KVM influences the interrupt-response times of VxWorks as a guest operating system. By applying several real-time performance tuning methods on the host Linux, we will show that sub-millisecond interrupt response latency can be achieved on the guest VxWorks.
{"title":"Performance analysis towards a KVM-Based embedded real-time virtualization architecture","authors":"Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan","doi":"10.1109/ICCIT.2010.5711095","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711095","url":null,"abstract":"In Recent years embedded world has been undergoing a shift from traditional single-core processors to processors with multiple cores. However, this shift poses a challenge of adapting legacy uniprocessor-oriented real-time operating system (RTOS) to exploit the capability of multi-core processor. In addition, some embedded systems are inevitably going towards the direction of integrating real-time with off-the-shelf time-sharing system, as the combination of the two has the potential to provide not only timely and deterministic response but also a large application base. Virtualization technology, which ensures strong isolation between virtual machines, is therefore a promising solution to above mentioned issues. However, there remains a concern regarding the responsiveness of the RTOS running on top of a virtual machine. In this paper we propose an embedded real-time virtualization architecture based on Kernel-Based Virtual Machine (KVM), in which VxWorks and Linux are combined together. We then analyze and evaluate how KVM influences the interrupt-response times of VxWorks as a guest operating system. By applying several real-time performance tuning methods on the host Linux, we will show that sub-millisecond interrupt response latency can be achieved on the guest VxWorks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.4156/ijact.vol3.issue3.2
K. Takemata, A. Minamide, A. Minamide, Y. Kawata
This study is related to the development of teaching materials for energy environmental education. It is focused on the thermal environment issues of the earth. In order to understand the thermal environment of the earth, it is necessary to learn regional thermal environments in local area first. We have developed an educational program for grasping the current situation of land coverage in each region while considering a community bus, which is one of public transportation means. In addition, we have produced teaching contents for stirring students' interests in the thermal environment, based on the air temperature observation data.
{"title":"Energy environmental education that supports sustainable town development","authors":"K. Takemata, A. Minamide, A. Minamide, Y. Kawata","doi":"10.4156/ijact.vol3.issue3.2","DOIUrl":"https://doi.org/10.4156/ijact.vol3.issue3.2","url":null,"abstract":"This study is related to the development of teaching materials for energy environmental education. It is focused on the thermal environment issues of the earth. In order to understand the thermal environment of the earth, it is necessary to learn regional thermal environments in local area first. We have developed an educational program for grasping the current situation of land coverage in each region while considering a community bus, which is one of public transportation means. In addition, we have produced teaching contents for stirring students' interests in the thermal environment, based on the air temperature observation data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711214
Beum-Su Park, Shirley Lee, Hoon-Jae Lee
Recently, due to the development of internet and digital media technology, the usage of illegal copy and distribution of digital media contents is increasing as well. Digital Right Management (DRM) was introduced to control the usage of the illegal and distribution of digital media. However, there are still some limitations in current DRM system. In this paper, we analyze the problem of existing DRM system by using One-Time Password (OTP) based on PINGPONG 128. In addition, we used partial descryption during the streaming progress to increase the security of the scheme.
{"title":"On a Digital-Right-Management system using One-Time-Password","authors":"Beum-Su Park, Shirley Lee, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711214","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711214","url":null,"abstract":"Recently, due to the development of internet and digital media technology, the usage of illegal copy and distribution of digital media contents is increasing as well. Digital Right Management (DRM) was introduced to control the usage of the illegal and distribution of digital media. However, there are still some limitations in current DRM system. In this paper, we analyze the problem of existing DRM system by using One-Time Password (OTP) based on PINGPONG 128. In addition, we used partial descryption during the streaming progress to increase the security of the scheme.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711123
Xiaotian Wu, Wei Sun
In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.
{"title":"Visual data hiding in dot diffusion images","authors":"Xiaotian Wu, Wei Sun","doi":"10.1109/ICCIT.2010.5711123","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711123","url":null,"abstract":"In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711019
Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia
Nowadays XML have reached a great interest, because it is possible to share information through the Web. Moreover, the Web can be conceived as a huge Database. Therefore, like DBMS traditional, the Web needs efficient algorithms to detect changes on the Database. In this paper we present an efficient algorithm to detect change in XML documents. Algorithm efficiency resides in the efficient application of Hash function and how this information is used. The theoretical complexity of algorithm is O(nlogn+ eG), where n is the number of vertices and eG is the cost to check all edges. The proposed algorithm was compared with X-Diff algorithm in order to show the new algorithm performance. Experimental results show a much better performance of CDL algorithm.
{"title":"Change Detection by Level (CDL): An efficient algorithm to detect change on XML documents","authors":"Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia","doi":"10.1109/ICCIT.2010.5711019","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711019","url":null,"abstract":"Nowadays XML have reached a great interest, because it is possible to share information through the Web. Moreover, the Web can be conceived as a huge Database. Therefore, like DBMS traditional, the Web needs efficient algorithms to detect changes on the Database. In this paper we present an efficient algorithm to detect change in XML documents. Algorithm efficiency resides in the efficient application of Hash function and how this information is used. The theoretical complexity of algorithm is O(nlogn+ eG), where n is the number of vertices and eG is the cost to check all edges. The proposed algorithm was compared with X-Diff algorithm in order to show the new algorithm performance. Experimental results show a much better performance of CDL algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711186
Sung-Soo Kim, Young-Min Kang, Jongho Won
We present a new procedural method for photorealistic rendering of woven fabric material. The goal of our research is to provide a new procedural method that renders photorealistic woven fabric without any measured data. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and yarn-level surface normal manipulation. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and deformed microfacet distribution function (MDF). The deformed MDF effectively represents the perturbed reflectance caused by bumps on the woven fabric surface. The experimental results show the proposed method can be successfully applied to photorealistic rendering of diverse woven fabric materials.
{"title":"Realistic woven fabric rendering using deformed microfacet distribution function","authors":"Sung-Soo Kim, Young-Min Kang, Jongho Won","doi":"10.1109/ICCIT.2010.5711186","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711186","url":null,"abstract":"We present a new procedural method for photorealistic rendering of woven fabric material. The goal of our research is to provide a new procedural method that renders photorealistic woven fabric without any measured data. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and yarn-level surface normal manipulation. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and deformed microfacet distribution function (MDF). The deformed MDF effectively represents the perturbed reflectance caused by bumps on the woven fabric surface. The experimental results show the proposed method can be successfully applied to photorealistic rendering of diverse woven fabric materials.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711116
JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha
This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.
{"title":"Fault attack for the iterative operation of AES S-Box","authors":"JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha","doi":"10.1109/ICCIT.2010.5711116","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711116","url":null,"abstract":"This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711159
Yao Feng-ge, Han Jing
The traditional real estate market theories are studied within the frame of neoclassical economics. As the core of neoclassical economics, Efficient Market Hypothesis (EMH) is the foundation of real estate market theory. But the traditional linear paradigm is facing a serious challenge from non-linear paradigm. Using R/S analysis method, which is the classical algorithm of Hurst index based on fractal characteristics, this paper did simulated experiment in the real estate market of china. The result shows that there exists a complex interaction among the factors, which could affect real estate market in China. It also reveals that Efficient Market Hypothesis (EMH) is not quite in line with the realities of the real estate market, and the psychology of individual and group investors has significant influence on the real estate market. The characters of fluctuations of real estate revenue in China are non-linear, non-equilibrium, fractal and chaotic. The fluctuation is in line with Fractional Brownian motion.
{"title":"The empirical study on fractal characteristics of real estate market","authors":"Yao Feng-ge, Han Jing","doi":"10.1109/ICCIT.2010.5711159","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711159","url":null,"abstract":"The traditional real estate market theories are studied within the frame of neoclassical economics. As the core of neoclassical economics, Efficient Market Hypothesis (EMH) is the foundation of real estate market theory. But the traditional linear paradigm is facing a serious challenge from non-linear paradigm. Using R/S analysis method, which is the classical algorithm of Hurst index based on fractal characteristics, this paper did simulated experiment in the real estate market of china. The result shows that there exists a complex interaction among the factors, which could affect real estate market in China. It also reveals that Efficient Market Hypothesis (EMH) is not quite in line with the realities of the real estate market, and the psychology of individual and group investors has significant influence on the real estate market. The characters of fluctuations of real estate revenue in China are non-linear, non-equilibrium, fractal and chaotic. The fluctuation is in line with Fractional Brownian motion.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}