首页 > 最新文献

2013 International Conference on IT Convergence and Security (ICITCS)最新文献

英文 中文
Surprising Consequences of Simple Privacy Protection Method 简单隐私保护方法的惊人后果
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717890
R. Nielek, Bogdan Ksiezopolski, A. Wierzbicki, Lukasz Anwajler
The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this business process is conducted outside an environment that can be controlled by organization and, thus, increases uncertainty of the whole solution. In this paper we propose a simple privacy protection method which prevent advertising companies form recording users' click and, thus, as a side effect break the corresponding business process. This method can be use on a voluntarily basis but also as the XSS-based attack against particular companies (e.g. these considered by activists as bad behaving). We show a method to estimate potential losses for global advertising company as the cause of this attack. Although it is very difcult to counteract this type of attack we have proposed some actions which can be taken to monitor and, to some extend, limit possible losses. We also consider a use of external intermediary who may help convince user that they clicks are not traced.
互联网的发展是可持续的,因为有现有的商业模式。其中最常见的一种是按点击付费,它基于记录用户的行为(特别是点击,但也可能是动作),并根据这些信息向广告商收费。另一方面,注册用户点击会对隐私造成严重威胁。此外,该业务流程的一部分是在可以由组织控制的环境之外进行的,因此增加了整个解决方案的不确定性。本文提出了一种简单的隐私保护方法,防止广告公司对用户的点击进行记录,从而破坏相应的业务流程。这种方法可以在自愿的基础上使用,也可以作为针对特定公司的基于xss的攻击(例如,激进分子认为这些公司行为不良)。我们展示了一种方法来估计全球广告公司作为这种攻击的原因的潜在损失。尽管抵制这种攻击非常困难,但我们提出了一些可以采取的行动,以监测并在一定程度上限制可能的损失。我们还考虑使用外部中介来帮助说服用户他们的点击没有被跟踪。
{"title":"Surprising Consequences of Simple Privacy Protection Method","authors":"R. Nielek, Bogdan Ksiezopolski, A. Wierzbicki, Lukasz Anwajler","doi":"10.1109/ICITCS.2013.6717890","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717890","url":null,"abstract":"The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this business process is conducted outside an environment that can be controlled by organization and, thus, increases uncertainty of the whole solution. In this paper we propose a simple privacy protection method which prevent advertising companies form recording users' click and, thus, as a side effect break the corresponding business process. This method can be use on a voluntarily basis but also as the XSS-based attack against particular companies (e.g. these considered by activists as bad behaving). We show a method to estimate potential losses for global advertising company as the cause of this attack. Although it is very difcult to counteract this type of attack we have proposed some actions which can be taken to monitor and, to some extend, limit possible losses. We also consider a use of external intermediary who may help convince user that they clicks are not traced.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information 利用ITU-R的电场强度预报程序的研制。P.1546地理信息建议
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717773
Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee
By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.
利用ITU-R P.1546标准的无线电传播预测,结合地理信息,给出了VHF和UHF频段的场强计算和干扰分析公式。为了说明给定系统参数下的一些计算结果,考虑了虚拟地理信息数据。
{"title":"A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information","authors":"Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee","doi":"10.1109/ICITCS.2013.6717773","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717773","url":null,"abstract":"By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Space Effective DRAM Adapter for PRAM-Based Main Memory System 基于pram的主存系统的空间有效DRAM适配器
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717785
Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim
As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.
随着新的非易失性存储器的出现,现在是重新评估传统存储器层次结构的合适时机,可以考虑利用新的非易失性存储器组件的潜力。本研究旨在设计一种新的基于PRAM的主存结构,在支持PRAM优势的同时提供与传统DRAM主存相似的性能。为了用非易失性pram取代传统的dram作为主要的存储组件,应该支持相当的存储访问延迟和存储单元耐久性。为此,我们提出了一种空间有效的DRAM适配器,用于基于PRAM的主存系统。DRAM适配器由两个页块缓冲区组成,以确保更好地使用空间局部性,并由两个过滤缓冲区组成,以更好地使用时间局部性。提出的结构是由一个跟踪驱动的模拟器使用speccpu2006跟踪评估。实验结果表明,与不带任何适配器的基于ram的主存储器相比,所提出的DRAM适配器可将访问延迟降低约60%,将PRAM的寿命提高约20倍。因此,我们所提出的记忆体架构可以用来取代目前基于dram的主记忆体系统。
{"title":"A Space Effective DRAM Adapter for PRAM-Based Main Memory System","authors":"Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim","doi":"10.1109/ICITCS.2013.6717785","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717785","url":null,"abstract":"As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multicast Based Service Orchestration Protocol 基于组播的业务编排协议
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717860
M. Pyo, Sangwook Bae, Sunyoung Han
Cloud computing has become the most attractive technology in distributed computing and a variety of cloud services have been introduced. However, there is still no widely accepted standard format to satisfy cloud service providers and users requests. Consequently, it caused the issue of interoperability among them. This paper proposes a cloud service orchestration protocol based on multicast. This protocol separates the network view of service information and the application view of service information when exchanging service information to support interoperability and it uses multicast at various point of protocol to support scalability. Cloud system may have a lot of services and users to communicate with each other. Hence, there are some needs for effective transfer method and the multicast is one of the ideal solutions for this problem. This protocol helps to interoperate with various cloud services like web services and embedded devices.
云计算已经成为分布式计算中最具吸引力的技术,各种云服务已经被引入。但是,仍然没有被广泛接受的标准格式来满足云服务提供商和用户的请求。因此,它引起了它们之间的互操作性问题。提出了一种基于组播的云服务编排协议。该协议在交换服务信息时分离了服务信息的网络视图和服务信息的应用程序视图以支持互操作性,并在协议的各个点使用多播来支持可伸缩性。云系统可能有大量的服务和用户相互通信。因此,需要一种有效的传输方法,组播是解决这一问题的理想方法之一。该协议有助于与各种云服务(如web服务和嵌入式设备)进行互操作。
{"title":"Multicast Based Service Orchestration Protocol","authors":"M. Pyo, Sangwook Bae, Sunyoung Han","doi":"10.1109/ICITCS.2013.6717860","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717860","url":null,"abstract":"Cloud computing has become the most attractive technology in distributed computing and a variety of cloud services have been introduced. However, there is still no widely accepted standard format to satisfy cloud service providers and users requests. Consequently, it caused the issue of interoperability among them. This paper proposes a cloud service orchestration protocol based on multicast. This protocol separates the network view of service information and the application view of service information when exchanging service information to support interoperability and it uses multicast at various point of protocol to support scalability. Cloud system may have a lot of services and users to communicate with each other. Hence, there are some needs for effective transfer method and the multicast is one of the ideal solutions for this problem. This protocol helps to interoperate with various cloud services like web services and embedded devices.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enterprise Business Intelligence Maturity Model: Case Study Approach 企业商业智能成熟度模型:案例研究方法
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717802
M. Chuah, Kee-Luen Wong
In new century, Business Intelligence (BI) is play important role in organizations. BI enables manager to visualize business performance in handy way and hence improve decision making. Despite aware of how essential of BI implementation, many organizations still struggle to achieve higher level of implementation. This paper proposes an Enterprise Business Maturity Model (EBI2M) and evaluates in the six companies in Malaysia.
在新世纪,商业智能(BI)在组织中发挥着越来越重要的作用。BI使管理者能够以方便的方式可视化业务绩效,从而改进决策制定。尽管意识到BI实现的重要性,但许多组织仍在努力实现更高层次的实现。本文提出了一个企业业务成熟度模型(EBI2M),并在马来西亚的六家公司中进行了评估。
{"title":"An Enterprise Business Intelligence Maturity Model: Case Study Approach","authors":"M. Chuah, Kee-Luen Wong","doi":"10.1109/ICITCS.2013.6717802","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717802","url":null,"abstract":"In new century, Business Intelligence (BI) is play important role in organizations. BI enables manager to visualize business performance in handy way and hence improve decision making. Despite aware of how essential of BI implementation, many organizations still struggle to achieve higher level of implementation. This paper proposes an Enterprise Business Maturity Model (EBI2M) and evaluates in the six companies in Malaysia.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy Preserving Problem Solving Scheme 保护私隐问题解决方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717873
H. Yamaguchi, M. Gotaishi, P. Sheu, S. Tsujii
A natural language-based problem solving schemes are expected as a key-issue of knowledge-intensive service functions in the Cloud computing environment. In the meanwhile, the privacy preserving issues are crucial due to involvement of expertise (such as knowledge, experience, idea, etc.) in the problems and its solution. We propose the cryptographic protocols preserving the privacy of users and confidentiality of the problem solving servers.
基于自然语言的问题解决方案是云计算环境下知识密集型服务功能的关键问题。同时,由于问题及其解决方案涉及专业知识(如知识、经验、想法等),隐私保护问题至关重要。我们提出了保护用户隐私和解决问题的服务器机密性的加密协议。
{"title":"Privacy Preserving Problem Solving Scheme","authors":"H. Yamaguchi, M. Gotaishi, P. Sheu, S. Tsujii","doi":"10.1109/ICITCS.2013.6717873","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717873","url":null,"abstract":"A natural language-based problem solving schemes are expected as a key-issue of knowledge-intensive service functions in the Cloud computing environment. In the meanwhile, the privacy preserving issues are crucial due to involvement of expertise (such as knowledge, experience, idea, etc.) in the problems and its solution. We propose the cryptographic protocols preserving the privacy of users and confidentiality of the problem solving servers.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132307488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System LTE-Femto系统的自适应移动鲁棒性调整方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717799
Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho
We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.
我们提出了自适应切换参数调整算法,以提供更好的最终用户体验和增加网络容量。这是通过根据性能指标的反馈自动调整单元参数来调整切换边界来实现的。本文的重点是根据用户在小区中的位置调整小区个体偏移的实际水平。从减少冗余无线链路故障的效率以及对用户吞吐量的影响方面对该方案进行了评估。结果显示RLF显著降低,同时降低了对吞吐量的影响。
{"title":"Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System","authors":"Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho","doi":"10.1109/ICITCS.2013.6717799","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717799","url":null,"abstract":"We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network-Based Internet Worm Intrusion Detection and Prevention System 基于网络的Internet蠕虫入侵检测与防御系统
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717779
N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew
Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.
以前曾报道过许多网络攻击和安全威胁事件。网络攻击和恶意软件造成的损失往往很高。本文提出了一种基于网络的入侵检测与防御系统(IDPS),该系统可以检测网络攻击和Internet蠕虫。本文提出的系统可以在独立模式和分布式模式下,利用流量分类技术和选定的知名机器学习算法(如Decision TreeC4.5、Random Forest、Ripple Rule、Bayesian network、Back Propagation Neural network),从正常网络流量中立即对网络攻击类型(如DoS、Probe)和Internet蠕虫进行分类。拟议的IDPS还允许系统管理员通过用户友好的图形用户界面更新现有规则集或学习新的训练数据集。在我们的实验中,我们可以正确地检测和预防网络攻击,准确率高达99%以上。
{"title":"A Network-Based Internet Worm Intrusion Detection and Prevention System","authors":"N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew","doi":"10.1109/ICITCS.2013.6717779","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717779","url":null,"abstract":"Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Celestial Map Renderer Based on 3D Graphics System 基于三维图形系统的天体地图渲染器
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717771
Young Chun Kwon, Nakhoon Baek
It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.
对于业余天文学家或普通人来说,要在夜空中找到一个特定的天体并不容易。我们代表了一个天体地图绘制程序,它再现了特定时间和地点的夜空。借助基于opengl的全3d图形功能,我们的系统带来了空间真实感。为了更准确地绘制天体图,我们参考了一套恒星目录,包括Messier list, Yale Catalog of Bright Stars等。由于该系统是在典型的PC上开发的,因此不需要任何特殊的设备,我们的系统可以以交互式的方式提供精确的天体地图。
{"title":"A Celestial Map Renderer Based on 3D Graphics System","authors":"Young Chun Kwon, Nakhoon Baek","doi":"10.1109/ICITCS.2013.6717771","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717771","url":null,"abstract":"It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers 基于nfc的中小商户移动优惠券的设计与实现
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717820
Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im
Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.
手机优惠券是一种电子票,目前用于金融折扣和回扣。NFC是一种短距离无线标准,其优点是通信非常简单。在本文中,我们提出了一个基于nfc的移动优惠券为小商人和企业家。由于小商店自己制作和分发优惠券的成本很高,因此NFC通信仅用于发送客户的身份证明。用户可以通过手机接收和查看优惠券信息。此外,我们的平台还提供一些社区服务,让小商家一起工作。
{"title":"Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers","authors":"Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im","doi":"10.1109/ICITCS.2013.6717820","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717820","url":null,"abstract":"Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 International Conference on IT Convergence and Security (ICITCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1