Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711176
Shih-Chun Chou, J. Stu, Yuting Lin
E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.
{"title":"Determinants of e-book readers adoption and continuation: A comparison of pre-adoption and post-adoption beliefs","authors":"Shih-Chun Chou, J. Stu, Yuting Lin","doi":"10.1109/ICCIT.2010.5711176","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711176","url":null,"abstract":"E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711225
C. Teng, Y. Shiau, C. Chen
Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.
{"title":"A data hiding algorithm based on histogram re-quantization","authors":"C. Teng, Y. Shiau, C. Chen","doi":"10.1109/ICCIT.2010.5711225","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711225","url":null,"abstract":"Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711151
Aihui Wang, M. Deng
The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.
{"title":"Human arm-like robot control using the viscoelasticity of human multi-joint arm","authors":"Aihui Wang, M. Deng","doi":"10.1109/ICCIT.2010.5711151","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711151","url":null,"abstract":"The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711032
Jae-Kwan Yun, Jonghyun Jang, Kyeong-Deok Moon
Recently, the requirements for the five sense media representation are arising rapidly. Until now, most people mainly used the method SMSD on one device, but we need more than one device to play multiple A/V and multiple sensory effects for effective five sense media representation. Therefore, multiple A/V device synchronization and multiple sensory effect device synchronization are very important part of five sense media representation. In this paper, we suggest concept of the five sense media playback, five sense media playback system architecture, and synchronization algorithm between multiple A/V devices and multiple sensory effect devices.
{"title":"Five sense media playback technology using multile devices synchronization","authors":"Jae-Kwan Yun, Jonghyun Jang, Kyeong-Deok Moon","doi":"10.1109/ICCIT.2010.5711032","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711032","url":null,"abstract":"Recently, the requirements for the five sense media representation are arising rapidly. Until now, most people mainly used the method SMSD on one device, but we need more than one device to play multiple A/V and multiple sensory effects for effective five sense media representation. Therefore, multiple A/V device synchronization and multiple sensory effect device synchronization are very important part of five sense media representation. In this paper, we suggest concept of the five sense media playback, five sense media playback system architecture, and synchronization algorithm between multiple A/V devices and multiple sensory effect devices.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126442601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711210
Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang
In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.
{"title":"Performance evaluation of ad hoc network under location-based attacks","authors":"Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang","doi":"10.1109/ICCIT.2010.5711210","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711210","url":null,"abstract":"In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711200
Mino Ku, D. Min, Eunmi Choi
Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.
{"title":"SCAREX: A framework for scalable, reliable, and extendable cluster computing","authors":"Mino Ku, D. Min, Eunmi Choi","doi":"10.1109/ICCIT.2010.5711200","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711200","url":null,"abstract":"Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711202
Feng Xu, Qi Zhou
Water conservancy is extremely important to the national economy and the people's livelihood. Video monitoring system based on 3G technology has played an important role in promoting the informatization of water resources. After introducing 3G technology and the actuality of IT application in water conservancy, we show how to use 3G as a forceful technical support for the further development of the informatization. Finally, the structure and functions also advantages of the water resources monitoring system based on 3G technology is discussed.
{"title":"The application of 3G technology in water resources monitoring system","authors":"Feng Xu, Qi Zhou","doi":"10.1109/ICCIT.2010.5711202","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711202","url":null,"abstract":"Water conservancy is extremely important to the national economy and the people's livelihood. Video monitoring system based on 3G technology has played an important role in promoting the informatization of water resources. After introducing 3G technology and the actuality of IT application in water conservancy, we show how to use 3G as a forceful technical support for the further development of the informatization. Finally, the structure and functions also advantages of the water resources monitoring system based on 3G technology is discussed.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711143
K. Nakamura, K. Akama
E-Learning systems are used by many learners and teachers. However, all system functions are not provided for the users. We discuss a method of constructing e-Learning systems where learners and teachers can design, try to use, and share new system functions that they want to use; which may be nally added to the system by system managers.
{"title":"Constructing new functions for E-learning system based on Clause-Rule model","authors":"K. Nakamura, K. Akama","doi":"10.1109/ICCIT.2010.5711143","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711143","url":null,"abstract":"E-Learning systems are used by many learners and teachers. However, all system functions are not provided for the users. We discuss a method of constructing e-Learning systems where learners and teachers can design, try to use, and share new system functions that they want to use; which may be nally added to the system by system managers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711130
Iman Omidvar Tehrani, S. Ibrahim
Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.
{"title":"An enhanced SVD based watermarking using U matrix","authors":"Iman Omidvar Tehrani, S. Ibrahim","doi":"10.1109/ICCIT.2010.5711130","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711130","url":null,"abstract":"Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711135
Md. Iftekhar Salam, Hoonjae Lee
A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.
{"title":"A review on the PKC-based security architecture for wireless sensor networks","authors":"Md. Iftekhar Salam, Hoonjae Lee","doi":"10.1109/ICCIT.2010.5711135","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711135","url":null,"abstract":"A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}