Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717808
Sung-Hwan Kim, Namuk Kim, Tai-Myung Chung
There has been an increasing interest in big data and big data security with the development of network technology and cloud computing. However, big data is not an entirely new technology but an extension of data mining. In this paper, we describe the background of big data, data mining and big data features, and propose attribute selection methodology for protecting the value of big data. Extracting valuable information is the main goal of analyzing big data which need to be protected. Therefore, relevance between attributes of a dataset is a very important element for big data analysis. We focus on two things. Firstly, attribute relevance in big data is a key element for extracting information. In this perspective, we studied on how to secure a big data through protecting valuable information inside. Secondly, it is impossible to protect all big data and its attributes. We consider big data as a single object which has its own attributes. We assume that a attribute which have a higher relevance is more important than other attributes.
{"title":"Attribute Relationship Evaluation Methodology for Big Data Security","authors":"Sung-Hwan Kim, Namuk Kim, Tai-Myung Chung","doi":"10.1109/ICITCS.2013.6717808","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717808","url":null,"abstract":"There has been an increasing interest in big data and big data security with the development of network technology and cloud computing. However, big data is not an entirely new technology but an extension of data mining. In this paper, we describe the background of big data, data mining and big data features, and propose attribute selection methodology for protecting the value of big data. Extracting valuable information is the main goal of analyzing big data which need to be protected. Therefore, relevance between attributes of a dataset is a very important element for big data analysis. We focus on two things. Firstly, attribute relevance in big data is a key element for extracting information. In this perspective, we studied on how to secure a big data through protecting valuable information inside. Secondly, it is impossible to protect all big data and its attributes. We consider big data as a single object which has its own attributes. We assume that a attribute which have a higher relevance is more important than other attributes.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"67 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717782
Wigi Vei A. Oliveros, C. Festin, R. Ocampo
Network booting is widely used today, mostly for thin-client computing, cluster computing, and operating system installation. Popular protocols like trivial file transfer protocol (TFTP) and hypertext transfer protocol (HTTP) are used to download operating system images. Network booting clients simultaneously downloading from a single server create a bottleneck at the server's link once the link capacity has been maximized. The result is a slowdown in the download time and the overall boot process. Several P2P network booting solutions exist, but they are implemented on top of a running operating system. In this paper, we propose a distributed downloading scheme at the network bootloader level using a BitTorrent-like protocol for network booting clients. We discuss the implementation of a new download protocol for iPXE, an open-source network bootloader, and evaluate the performance of TFTP, HTTP, and the proposed BitTorrent-like protocol by measuring their download times over varying file sizes and number of nodes. On 20 clients, simultaneously downloading a 500 MiB file using the proposed protocol resulted to a decrease in average download time of 51.6% compared to TFTP and 46.6% compared to HTTP.
{"title":"A P2P Network Booting Scheme Using a BitTorrent-Like Protocol","authors":"Wigi Vei A. Oliveros, C. Festin, R. Ocampo","doi":"10.1109/ICITCS.2013.6717782","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717782","url":null,"abstract":"Network booting is widely used today, mostly for thin-client computing, cluster computing, and operating system installation. Popular protocols like trivial file transfer protocol (TFTP) and hypertext transfer protocol (HTTP) are used to download operating system images. Network booting clients simultaneously downloading from a single server create a bottleneck at the server's link once the link capacity has been maximized. The result is a slowdown in the download time and the overall boot process. Several P2P network booting solutions exist, but they are implemented on top of a running operating system. In this paper, we propose a distributed downloading scheme at the network bootloader level using a BitTorrent-like protocol for network booting clients. We discuss the implementation of a new download protocol for iPXE, an open-source network bootloader, and evaluate the performance of TFTP, HTTP, and the proposed BitTorrent-like protocol by measuring their download times over varying file sizes and number of nodes. On 20 clients, simultaneously downloading a 500 MiB file using the proposed protocol resulted to a decrease in average download time of 51.6% compared to TFTP and 46.6% compared to HTTP.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123787445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717795
Pham Phuoc Hung, Tuan-Anh Bui, E. Huh
Although the convergence of the two emerging trends: cloud computing and mobile computing can somehow compensate the shortage of hardware capability in mobile devices by offloading requested work to the cloud, most of the research studies are not yet efficient in making cloud usage experience as painless as possible, especially when access to cloud becomes expensive. We propose in this paper an architecture based on a collaboration of thin-thick clients and clouds that focuses on providing an effective task scheduling which can boost up the processing time in the mobile cloud platform while considering the network bandwidth and cost for cloud service usage. Experimental results show the significantly improved efficiency of the task scheduling in bringing desired processing time corresponding to the money paid by customers.
{"title":"A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud Computing","authors":"Pham Phuoc Hung, Tuan-Anh Bui, E. Huh","doi":"10.1109/ICITCS.2013.6717795","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717795","url":null,"abstract":"Although the convergence of the two emerging trends: cloud computing and mobile computing can somehow compensate the shortage of hardware capability in mobile devices by offloading requested work to the cloud, most of the research studies are not yet efficient in making cloud usage experience as painless as possible, especially when access to cloud becomes expensive. We propose in this paper an architecture based on a collaboration of thin-thick clients and clouds that focuses on providing an effective task scheduling which can boost up the processing time in the mobile cloud platform while considering the network bandwidth and cost for cloud service usage. Experimental results show the significantly improved efficiency of the task scheduling in bringing desired processing time corresponding to the money paid by customers.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717780
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, and conjugacy search problem.
{"title":"A New Key Exchange Protocol on Thompson Groups","authors":"Hongxin Ma, Yingjue Fang, Xiaofeng Wang","doi":"10.1109/ICITCS.2013.6717780","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717780","url":null,"abstract":"By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, and conjugacy search problem.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717814
Ivy Joy G. Mallare, S. Pancho-Festin
We investigate the effects of combining Task and Role-based access control models for a medical workflow system. Although Role-based Access Control (RBAC) models provide a generalized approach to access control, it cannot cope with the growing complexity of modern health care systems that require dynamic authorizations. Task-based Access Control (TBAC ) can help address the need for dynamic authorizations but TBAC alone cannot address healthcare access control requirements. Roles and tasks together can form a much flexible access control than roles or tasks alone. We studied the integration of TBAC and RBAC for a workflow system. Moreover, we applied multiple constraints on users, roles, and tasks.
{"title":"Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System","authors":"Ivy Joy G. Mallare, S. Pancho-Festin","doi":"10.1109/ICITCS.2013.6717814","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717814","url":null,"abstract":"We investigate the effects of combining Task and Role-based access control models for a medical workflow system. Although Role-based Access Control (RBAC) models provide a generalized approach to access control, it cannot cope with the growing complexity of modern health care systems that require dynamic authorizations. Task-based Access Control (TBAC ) can help address the need for dynamic authorizations but TBAC alone cannot address healthcare access control requirements. Roles and tasks together can form a much flexible access control than roles or tasks alone. We studied the integration of TBAC and RBAC for a workflow system. Moreover, we applied multiple constraints on users, roles, and tasks.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During these years, the research field of certificateless signature (CLS) scheme without bilinear pairings is promptly investigated as the key escrow problem in identity-based cryptography can be solved via this concept. In this paper, we demonstrate that a certificateless signature scheme proposed by Gong and Li cannot fulfil its security claims. The authors argued that their proposed certificateless signature scheme is able to resist to the type of super adversary. However, this security argument can be improved. We present a series of attack processes to point out that Gong and Li's scheme is insecure against a super type I ad-versary. A remedy mechanism is then proposed to provide the security enhancement .
{"title":"Robust Certificateless Signature Scheme without Bilinear Pairings","authors":"Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu","doi":"10.1109/ICITCS.2013.6717878","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717878","url":null,"abstract":"During these years, the research field of certificateless signature (CLS) scheme without bilinear pairings is promptly investigated as the key escrow problem in identity-based cryptography can be solved via this concept. In this paper, we demonstrate that a certificateless signature scheme proposed by Gong and Li cannot fulfil its security claims. The authors argued that their proposed certificateless signature scheme is able to resist to the type of super adversary. However, this security argument can be improved. We present a series of attack processes to point out that Gong and Li's scheme is insecure against a super type I ad-versary. A remedy mechanism is then proposed to provide the security enhancement .","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717845
P. K. Anooj
As people have interests in their health recently, development of medical domain application has been one of the most active research areas. One example of medical domain application is detection system for heart disease based on computer-aided diagnosis methods, were the data are obtained from some other sources and are evaluated based on computer based applications. At the earlier time, the use of computer is to build knowledge based clinical decision support system which uses knowledge from medical experts and transfers this knowledge into computer algorithms manually. This process is time consuming and really depends on medical expert's opinion which may be subjective. To handle this problem, machine learning techniques have been developed to gain knowledge automatically from examples or raw data. Here, a weighted fuzzy rule-based clinical decision support system (CDSS) is presented for the diagnosis of heart disease, automatically obtaining the knowledge from the patient's clinical data. The proposed clinical decision support system for risk prediction of heart patients consists of two phases, (1) automated approach for generation of weighted fuzzy rules, and (2) developing a fuzzy rule-based decision support system. In the first phase, we have used the mining technique, attribute selection and attribute weightage method to obtain the weighted fuzzy rules. Then, the fuzzy system is constructed in accordance with the weighted fuzzy rules and chosen attributes. Finally, the experimentation is carried out on the proposed system using the datasets obtained from the UCI repository and the performance of the system is compared with the neural network-based system utilizing accuracy, sensitivity and specificity.
{"title":"Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based Systems","authors":"P. K. Anooj","doi":"10.1109/ICITCS.2013.6717845","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717845","url":null,"abstract":"As people have interests in their health recently, development of medical domain application has been one of the most active research areas. One example of medical domain application is detection system for heart disease based on computer-aided diagnosis methods, were the data are obtained from some other sources and are evaluated based on computer based applications. At the earlier time, the use of computer is to build knowledge based clinical decision support system which uses knowledge from medical experts and transfers this knowledge into computer algorithms manually. This process is time consuming and really depends on medical expert's opinion which may be subjective. To handle this problem, machine learning techniques have been developed to gain knowledge automatically from examples or raw data. Here, a weighted fuzzy rule-based clinical decision support system (CDSS) is presented for the diagnosis of heart disease, automatically obtaining the knowledge from the patient's clinical data. The proposed clinical decision support system for risk prediction of heart patients consists of two phases, (1) automated approach for generation of weighted fuzzy rules, and (2) developing a fuzzy rule-based decision support system. In the first phase, we have used the mining technique, attribute selection and attribute weightage method to obtain the weighted fuzzy rules. Then, the fuzzy system is constructed in accordance with the weighted fuzzy rules and chosen attributes. Finally, the experimentation is carried out on the proposed system using the datasets obtained from the UCI repository and the performance of the system is compared with the neural network-based system utilizing accuracy, sensitivity and specificity.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717800
G. Cheng, J. Chau
This paper reports and discusses on the initial stage of developing an educational tool to support Chinese undergraduate students in reflecting on their English language (L2) learning experience. By using a classification framework called A-S-E-R and Latent Semantic Analysis, we developed a digital tool to automatically classify reflective L2 learning skills into different elements and hierarchical levels. This paper begins by presenting the background and objectives of the study, followed by the details of method and results. Preliminary findings show that the tool performed satisfactorily on our testing data and the computer-generated reflection ratings were comparable to human ratings.
本文报道并讨论了开发一种教育工具的初始阶段,以支持中国本科生反思他们的英语语言(L2)学习经验。通过使用称为a - s - e - r和潜在语义分析的分类框架,我们开发了一个数字工具,可以自动将反思性第二语言学习技能分类为不同的元素和层次。本文首先介绍了研究的背景和目的,然后详细介绍了研究的方法和结果。初步结果表明,该工具在我们的测试数据上表现令人满意,计算机生成的反射评级与人类评级相当。
{"title":"An Approach to Identify Levels of Reflection Using Latent Semantic Analysis","authors":"G. Cheng, J. Chau","doi":"10.1109/ICITCS.2013.6717800","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717800","url":null,"abstract":"This paper reports and discusses on the initial stage of developing an educational tool to support Chinese undergraduate students in reflecting on their English language (L2) learning experience. By using a classification framework called A-S-E-R and Latent Semantic Analysis, we developed a digital tool to automatically classify reflective L2 learning skills into different elements and hierarchical levels. This paper begins by presenting the background and objectives of the study, followed by the details of method and results. Preliminary findings show that the tool performed satisfactorily on our testing data and the computer-generated reflection ratings were comparable to human ratings.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717774
Ahmad A. Al-Daraiseh, E. El-Qawasmeh, N. Shah
Excessive utilization of Heating, Ventilation and Air Conditioning (HVAC), and Information and Communication Technology (ICT) equipment in Higher Education Institutes (HEI) in addition to variation in occupancy patterns are the main reasons behind the ever increasing level of energy consumption in such environments. Reducing energy consumption while maintaining the comfort level of students and staff is a very challenging task. In this research we attempt to solve this dilemma by developing a framework that utilizes ICT to monitor and manage energy consumption in HEI. The system monitors electrical equipment individually and also collects environmental parameters such as temperature, humidity and occupancy to optimize energy consumption. At King Saud University (KSU) we implemented the first phase of the system by using wireless sensors that measure energy consumption of any electrical device once every 10 second. Energy consumption data is then displayed to building managers, students and staff to create awareness. It was also utilized to generate situation specific advice. In addition to the unique design, the novelty of this work stems from the utilization of timetable and event management systems, which we believe was never used before in developing such systems.
{"title":"A Framework for Energy Monitoring and Management System for Educational Institutions","authors":"Ahmad A. Al-Daraiseh, E. El-Qawasmeh, N. Shah","doi":"10.1109/ICITCS.2013.6717774","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717774","url":null,"abstract":"Excessive utilization of Heating, Ventilation and Air Conditioning (HVAC), and Information and Communication Technology (ICT) equipment in Higher Education Institutes (HEI) in addition to variation in occupancy patterns are the main reasons behind the ever increasing level of energy consumption in such environments. Reducing energy consumption while maintaining the comfort level of students and staff is a very challenging task. In this research we attempt to solve this dilemma by developing a framework that utilizes ICT to monitor and manage energy consumption in HEI. The system monitors electrical equipment individually and also collects environmental parameters such as temperature, humidity and occupancy to optimize energy consumption. At King Saud University (KSU) we implemented the first phase of the system by using wireless sensors that measure energy consumption of any electrical device once every 10 second. Energy consumption data is then displayed to building managers, students and staff to create awareness. It was also utilized to generate situation specific advice. In addition to the unique design, the novelty of this work stems from the utilization of timetable and event management systems, which we believe was never used before in developing such systems.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717887
Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun
Previous results of researches related speech recognition, especially vowel recognitions, can be applied for synchronizing the mouth movement with a dialogue in digital contents such as animations and e-learning contents. Since the mouth movement of objects has to be synchronized with a dialogue exactly, lip-sync is one of tedious works for animators and a time consuming work. The mismatch or artificialness between mouth shape of characters and speaking reduces the immersion in the contents. This paper proposes a new technique to automatically perform lip synching for a computer generated character to match a real speech or a dialogue using real time vowel recognition with the formant analysis. The proposed algorithm should be one of speaker dependent speech recognition since our concern is only for a certain voice actor related a certain character. The result shows that the vowels are recognized from a voice actor' speech with real time and the average of the recognition ratio is 97.3%.
{"title":"Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital Contents","authors":"Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun","doi":"10.1109/ICITCS.2013.6717887","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717887","url":null,"abstract":"Previous results of researches related speech recognition, especially vowel recognitions, can be applied for synchronizing the mouth movement with a dialogue in digital contents such as animations and e-learning contents. Since the mouth movement of objects has to be synchronized with a dialogue exactly, lip-sync is one of tedious works for animators and a time consuming work. The mismatch or artificialness between mouth shape of characters and speaking reduces the immersion in the contents. This paper proposes a new technique to automatically perform lip synching for a computer generated character to match a real speech or a dialogue using real time vowel recognition with the formant analysis. The proposed algorithm should be one of speaker dependent speech recognition since our concern is only for a certain voice actor related a certain character. The result shows that the vowels are recognized from a voice actor' speech with real time and the average of the recognition ratio is 97.3%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}