首页 > 最新文献

2013 International Conference on IT Convergence and Security (ICITCS)最新文献

英文 中文
Detecting Illegally-Copied Apps on Android Devices 检测Android设备上非法复制的应用程序
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717822
Eunhoe Kim, Sungmin Kim, Jaeyoung Choi
As the copyright for apps in smartphones is not protected properly, a number of illegally-copied apps are widely used. This gives rises to the degradation of the app market's transparency and reliability. In this paper, we propose a method detecting illegally-copied apps on the Android devices in order to solve the aforementioned problem. The illegally-copied app detector allows the user not to know whether it is running and offers a concealment function, which the user can't access or remove forcibly from outside. In addition, the proposed detector uses signature-based forensic marking techniques, which determines whether the app is illegally copied or not. The illegally-copied app detector can effectively prevent the use of the illegally-copied app installed or stored in internal/external memory on Android Devices.
由于智能手机应用程序的版权保护不到位,大量非法复制的应用程序被广泛使用。这导致应用市场的透明度和可靠性下降。为了解决上述问题,本文提出了一种检测Android设备上非法复制应用的方法。非法复制的应用程序检测器允许用户不知道它是否正在运行,并提供隐藏功能,用户无法从外部访问或强行删除。此外,该检测器还使用基于签名的取证标记技术来确定应用程序是否被非法复制。非法复制应用检测器可以有效防止Android设备上安装或存储在内部/外部内存中的非法复制应用的使用。
{"title":"Detecting Illegally-Copied Apps on Android Devices","authors":"Eunhoe Kim, Sungmin Kim, Jaeyoung Choi","doi":"10.1109/ICITCS.2013.6717822","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717822","url":null,"abstract":"As the copyright for apps in smartphones is not protected properly, a number of illegally-copied apps are widely used. This gives rises to the degradation of the app market's transparency and reliability. In this paper, we propose a method detecting illegally-copied apps on the Android devices in order to solve the aforementioned problem. The illegally-copied app detector allows the user not to know whether it is running and offers a concealment function, which the user can't access or remove forcibly from outside. In addition, the proposed detector uses signature-based forensic marking techniques, which determines whether the app is illegally copied or not. The illegally-copied app detector can effectively prevent the use of the illegally-copied app installed or stored in internal/external memory on Android Devices.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Space Effective DRAM Adapter for PRAM-Based Main Memory System 基于pram的主存系统的空间有效DRAM适配器
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717785
Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim
As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.
随着新的非易失性存储器的出现,现在是重新评估传统存储器层次结构的合适时机,可以考虑利用新的非易失性存储器组件的潜力。本研究旨在设计一种新的基于PRAM的主存结构,在支持PRAM优势的同时提供与传统DRAM主存相似的性能。为了用非易失性pram取代传统的dram作为主要的存储组件,应该支持相当的存储访问延迟和存储单元耐久性。为此,我们提出了一种空间有效的DRAM适配器,用于基于PRAM的主存系统。DRAM适配器由两个页块缓冲区组成,以确保更好地使用空间局部性,并由两个过滤缓冲区组成,以更好地使用时间局部性。提出的结构是由一个跟踪驱动的模拟器使用speccpu2006跟踪评估。实验结果表明,与不带任何适配器的基于ram的主存储器相比,所提出的DRAM适配器可将访问延迟降低约60%,将PRAM的寿命提高约20倍。因此,我们所提出的记忆体架构可以用来取代目前基于dram的主记忆体系统。
{"title":"A Space Effective DRAM Adapter for PRAM-Based Main Memory System","authors":"Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim","doi":"10.1109/ICITCS.2013.6717785","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717785","url":null,"abstract":"As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Information Protection Modules for Secure Mobile Payments 安全移动支付的信息保护模块研究
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717791
Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-soo Jung
In recent years, there are also actively being studied the applicable applications based on NFC that can apply as the form of convergence of the application. Typically, there are mobile payment services. This is because of technologies that it can ensure the efficiency of user's side and the safety of the important personal payment information. However, various problems have also been pointed out as like unsupported of the personal information, exposure of payment information. Therefore, in this paper, we analyze the security threats, security requirements and security modules in as you proceed the payment using the NFC-based mobile.
近年来,人们也在积极研究基于NFC的适用应用,以应用的融合形式应用。最典型的是移动支付服务。这是因为它的技术可以保证用户端的效率和重要个人支付信息的安全。但是,人们也指出了个人信息不支持、支付信息外泄等各种问题。因此,在本文中,我们分析了使用基于nfc的手机进行支付的安全威胁、安全需求和安全模块。
{"title":"A Study on the Information Protection Modules for Secure Mobile Payments","authors":"Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-soo Jung","doi":"10.1109/ICITCS.2013.6717791","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717791","url":null,"abstract":"In recent years, there are also actively being studied the applicable applications based on NFC that can apply as the form of convergence of the application. Typically, there are mobile payment services. This is because of technologies that it can ensure the efficiency of user's side and the safety of the important personal payment information. However, various problems have also been pointed out as like unsupported of the personal information, exposure of payment information. Therefore, in this paper, we analyze the security threats, security requirements and security modules in as you proceed the payment using the NFC-based mobile.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information 利用ITU-R的电场强度预报程序的研制。P.1546地理信息建议
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717773
Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee
By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.
利用ITU-R P.1546标准的无线电传播预测,结合地理信息,给出了VHF和UHF频段的场强计算和干扰分析公式。为了说明给定系统参数下的一些计算结果,考虑了虚拟地理信息数据。
{"title":"A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information","authors":"Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee","doi":"10.1109/ICITCS.2013.6717773","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717773","url":null,"abstract":"By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Abnormal Event Detection Using HOSF 使用HOSF检测异常事件
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717798
Shwu-Huey Yen, Chun-Hui Wang
In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as the feature vector to encode the observed events of a surveillance video. A dictionary of codewords is trained to include typical HOSFs. To detect whether an event is normal is accomplished by comparing how similar to the closest codeword via z-value. The proposed method includes the following characteristic: (1) the training is automatic without human labeling; (2) instead of object tracking, the method integrates particles and social force as feature descriptors; (3) z-score is used in measuring the normality of events. The method is testified by the UMN dataset with promising results.
本文提出了一种简单有效的群体行为正态性方法。采用定向社会力直方图(HOSF)作为特征向量,对监控视频中观察到的事件进行编码。一个码字字典被训练以包含典型的hofs。检测事件是否正常是通过比较z值与最近的码字的相似程度来完成的。该方法具有以下特点:(1)训练是自动的,无需人工标注;(2)采用粒子和社会力作为特征描述符,代替目标跟踪;(3) z-score用于衡量事件的正态性。通过UMN数据集验证了该方法的有效性。
{"title":"Abnormal Event Detection Using HOSF","authors":"Shwu-Huey Yen, Chun-Hui Wang","doi":"10.1109/ICITCS.2013.6717798","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717798","url":null,"abstract":"In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as the feature vector to encode the observed events of a surveillance video. A dictionary of codewords is trained to include typical HOSFs. To detect whether an event is normal is accomplished by comparing how similar to the closest codeword via z-value. The proposed method includes the following characteristic: (1) the training is automatic without human labeling; (2) instead of object tracking, the method integrates particles and social force as feature descriptors; (3) z-score is used in measuring the normality of events. The method is testified by the UMN dataset with promising results.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Motion Dense Sampling for Video Classification 用于视频分类的运动密集采样
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717859
Kazuaki Aihara, T. Aoki
In this paper, we propose the motion dense sampling (MDS) for video classification, which detects very informative interest points from video frames. MDS has two advantages compared to other existing methods. The first advantage is that MDS detects only interest points which belong to foreground regions of all regions of a video frame. Also it can detect the constant number of points even when the size of foreground region in an image drastically changes. The Second one is that MDS enable to describe scale invariable features by computing sampling scale for each frame based on the size of foreground regions. Thus, our method detects much more informative interest points from videos than other methods. Experimental results show a significant improvement over existing methods on YouTube dataset. Our method achieves 86.8% accuracy for video classification by using only one descriptor.
在本文中,我们提出了用于视频分类的运动密集采样(MDS),它从视频帧中检测出非常有信息量的兴趣点。与其他现有方法相比,MDS具有两个优点。第一个优点是MDS只检测属于视频帧的所有区域的前景区域的兴趣点。此外,即使在图像前景区域的大小发生巨大变化时,它也可以检测到恒定数量的点。二是基于前景区域的大小计算每帧的采样尺度,实现尺度不变特征的描述。因此,我们的方法比其他方法从视频中检测到更多的信息兴趣点。实验结果表明,该方法在YouTube数据集上比现有方法有了显著的改进。该方法仅使用一个描述符,视频分类准确率达到86.8%。
{"title":"Motion Dense Sampling for Video Classification","authors":"Kazuaki Aihara, T. Aoki","doi":"10.1109/ICITCS.2013.6717859","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717859","url":null,"abstract":"In this paper, we propose the motion dense sampling (MDS) for video classification, which detects very informative interest points from video frames. MDS has two advantages compared to other existing methods. The first advantage is that MDS detects only interest points which belong to foreground regions of all regions of a video frame. Also it can detect the constant number of points even when the size of foreground region in an image drastically changes. The Second one is that MDS enable to describe scale invariable features by computing sampling scale for each frame based on the size of foreground regions. Thus, our method detects much more informative interest points from videos than other methods. Experimental results show a significant improvement over existing methods on YouTube dataset. Our method achieves 86.8% accuracy for video classification by using only one descriptor.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130077662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System LTE-Femto系统的自适应移动鲁棒性调整方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717799
Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho
We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.
我们提出了自适应切换参数调整算法,以提供更好的最终用户体验和增加网络容量。这是通过根据性能指标的反馈自动调整单元参数来调整切换边界来实现的。本文的重点是根据用户在小区中的位置调整小区个体偏移的实际水平。从减少冗余无线链路故障的效率以及对用户吞吐量的影响方面对该方案进行了评估。结果显示RLF显著降低,同时降低了对吞吐量的影响。
{"title":"Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System","authors":"Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho","doi":"10.1109/ICITCS.2013.6717799","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717799","url":null,"abstract":"We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network-Based Internet Worm Intrusion Detection and Prevention System 基于网络的Internet蠕虫入侵检测与防御系统
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717779
N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew
Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.
以前曾报道过许多网络攻击和安全威胁事件。网络攻击和恶意软件造成的损失往往很高。本文提出了一种基于网络的入侵检测与防御系统(IDPS),该系统可以检测网络攻击和Internet蠕虫。本文提出的系统可以在独立模式和分布式模式下,利用流量分类技术和选定的知名机器学习算法(如Decision TreeC4.5、Random Forest、Ripple Rule、Bayesian network、Back Propagation Neural network),从正常网络流量中立即对网络攻击类型(如DoS、Probe)和Internet蠕虫进行分类。拟议的IDPS还允许系统管理员通过用户友好的图形用户界面更新现有规则集或学习新的训练数据集。在我们的实验中,我们可以正确地检测和预防网络攻击,准确率高达99%以上。
{"title":"A Network-Based Internet Worm Intrusion Detection and Prevention System","authors":"N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew","doi":"10.1109/ICITCS.2013.6717779","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717779","url":null,"abstract":"Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Celestial Map Renderer Based on 3D Graphics System 基于三维图形系统的天体地图渲染器
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717771
Young Chun Kwon, Nakhoon Baek
It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.
对于业余天文学家或普通人来说,要在夜空中找到一个特定的天体并不容易。我们代表了一个天体地图绘制程序,它再现了特定时间和地点的夜空。借助基于opengl的全3d图形功能,我们的系统带来了空间真实感。为了更准确地绘制天体图,我们参考了一套恒星目录,包括Messier list, Yale Catalog of Bright Stars等。由于该系统是在典型的PC上开发的,因此不需要任何特殊的设备,我们的系统可以以交互式的方式提供精确的天体地图。
{"title":"A Celestial Map Renderer Based on 3D Graphics System","authors":"Young Chun Kwon, Nakhoon Baek","doi":"10.1109/ICITCS.2013.6717771","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717771","url":null,"abstract":"It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers 基于nfc的中小商户移动优惠券的设计与实现
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717820
Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im
Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.
手机优惠券是一种电子票,目前用于金融折扣和回扣。NFC是一种短距离无线标准,其优点是通信非常简单。在本文中,我们提出了一个基于nfc的移动优惠券为小商人和企业家。由于小商店自己制作和分发优惠券的成本很高,因此NFC通信仅用于发送客户的身份证明。用户可以通过手机接收和查看优惠券信息。此外,我们的平台还提供一些社区服务,让小商家一起工作。
{"title":"Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers","authors":"Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im","doi":"10.1109/ICITCS.2013.6717820","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717820","url":null,"abstract":"Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 International Conference on IT Convergence and Security (ICITCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1