Upload
duongcong
View
212
Download
0
Embed Size (px)
Citation preview
Lecture Notes in Electrical Engineering
Volume 448
Board of Series editors
Leopoldo Angrisani, Napoli, ItalyMarco Arteaga, Coyoacán, MéxicoSamarjit Chakraborty, München, GermanyJiming Chen, Hangzhou, P.R. ChinaTan Kay Chen, Singapore, SingaporeRüdiger Dillmann, Karlsruhe, GermanyHaibin Duan, Beijing, ChinaGianluigi Ferrari, Parma, ItalyManuel Ferre, Madrid, SpainSandra Hirche, München, GermanyFaryar Jabbari, Irvine, USAJanusz Kacprzyk, Warsaw, PolandAlaa Khamis, New Cairo City, EgyptTorsten Kroeger, Stanford, USATan Cher Ming, Singapore, SingaporeWolfgang Minker, Ulm, GermanyPradeep Misra, Dayton, USASebastian Möller, Berlin, GermanySubhas Mukhopadyay, Palmerston, New ZealandCun-Zheng Ning, Tempe, USAToyoaki Nishida, Sakyo-ku, JapanBijaya Ketan Panigrahi, New Delhi, IndiaFederica Pascucci, Roma, ItalyTariq Samad, Minneapolis, USAGan Woon Seng, Nanyang Avenue, SingaporeGermano Veiga, Porto, PortugalHaitao Wu, Beijing, ChinaJunjie James Zhang, Charlotte, USA
About this Series
“Lecture Notes in Electrical Engineering (LNEE)” is a book series which reportsthe latest research and developments in Electrical Engineering, namely:
• Communication, Networks, and Information Theory• Computer Engineering• Signal, Image, Speech and Information Processing• Circuits and Systems• Bioengineering
LNEE publishes authored monographs and contributed volumes which presentcutting edge research information as well as new perspectives on classical fields,while maintaining Springer’s high standards of academic excellence. Alsoconsidered for publication are lecture materials, proceedings, and other relatedmaterials of exceptionally high quality and interest. The subject matter should beoriginal and timely, reporting the latest research and developments in all areas ofelectrical engineering.
The audience for the books in LNEE consists of advanced level students,researchers, and industry professionals working at the forefront of their fields. Muchlike Springer’s other Lecture Notes series, LNEE will be distributed throughSpringer’s print and electronic publishing channels.
More information about this series at http://www.springer.com/series/7818
James J. (Jong Hyuk) ParkShu-Ching Chen • Kim-Kwang Raymond ChooEditors
Advanced Multimediaand Ubiquitous EngineeringMUE/FutureTech 2017
123
EditorsJames J. (Jong Hyuk) ParkComputer Science and EngineeringSeoul National University of Scienceand Technology
SeoulKorea (Republic of)
Shu-Ching ChenSchool of Computing and InformationSciences
Florida International UniversityMiami, FLUSA
Kim-Kwang Raymond ChooDepartment of Information Systemsand Cyber Security
The University of Texas at San AntonioAdelaideAustralia
ISSN 1876-1100 ISSN 1876-1119 (electronic)Lecture Notes in Electrical EngineeringISBN 978-981-10-5040-4 ISBN 978-981-10-5041-1 (eBook)DOI 10.1007/978-981-10-5041-1
Library of Congress Control Number: 2017940720
© Springer Nature Singapore Pte Ltd. 2017This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made. The publisher remains neutral with regard tojurisdictional claims in published maps and institutional affiliations.
Printed on acid-free paper
This Springer imprint is published by Springer NatureThe registered company is Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Message from the FutureTech2017General Chairs
FutureTech2017 is the 12th event of the series of international scientific conference.This conference will take place on May 22–24, 2017 in Seoul, South Korea. The aimof the FutureTech2017 is to provide an international forum for scientific research inthe technologies and application of information technology. FutureTech 2017 is thenext edition of FutureTech2016 (Beijing, China), FutureTech2015 (Hanoi,Vietnam), FutureTech2014 (Zhangjiajie, China), FutureTech2013 (Gwangju,Korea), FutureTech2012 (Vancouver, Canada), FutureTech2011 (Loutraki, Greece),FutureTech2010 (Busan, Korea, May 2010), which was the next event in a series ofhighly successful the International Symposium on Ubiquitous Applications &Security Services (UASS-09, USA, January 2009), previously held as UASS-08(Okinawa, Japan, March 2008), UASS-07 (Kuala Lumpur, Malaysia, August, 2007),and UASS-06 (Glasgow, Scotland, UK, May, 2006).
The conference papers included in the proceedings cover the following topics:Hybrid Information Technology, High-performance Computing, Cloud and ClusterComputing, Ubiquitous Networks and Wireless Communications, DigitalConvergence, Multimedia Convergence, Intelligent and Pervasive Applications,Security and Trust Computing, IT Management and Service, Bioinformatics andBio-inspired Computing, Database and Data Mining, Knowledge System andIntelligent Agent, Game and Graphics, and Human-centric Computing and SocialNetworks. Accepted and presented papers highlight new trends and challenges offuture information technologies. We hope readers will find these results useful andinspiring for their future research.
We would like to express our sincere thanks to Program Chairs: Ching-HsienHsu (Chung Hua University, Taiwan), Yunsick Sung (Dongguk University, Korea),Kwang-il Hwang (Incheon National University, Korea), Houcine Hassan(Universitat Politecnica de Valencia, Spain), Jin Wang (Yangzhou University,China), all Program Committee members, and all reviewers for their valuable effortsin the review process that helped us to guarantee the highest quality of the selectedpapers for the conference.
v
We cordially thank all the authors for their valuable contributions and the otherparticipants of this conference. The conference would not have been possiblewithout their support. Thanks are also due to the many experts who contributed tomaking the event a success.
FutureTech 2017 General ChairsKim-Kwang Raymond Choo
Gangman YiJiannong Cao
vi Message from the FutureTech2017 General Chairs
Message from the FutureTech2017Program Chairs
Welcome to the 12th International Conference on Future Information Technology(FutureTech 2017), which will be held in Seoul, Korea, on May 22–24, 2017.FutureTech2017 will be the most comprehensive conference focused on the variousaspects of information technologies. It will provide an opportunity for academic andindustry professionals to discuss recent progress in the area of future informationtechnologies. In addition, the conference will publish high-quality papers which areclosely related to the various theories and practical applications in multimedia andubiquitous engineering. Furthermore, we expect that the conference and its publi-cations will be a trigger for further related research and technology improvements inthese important subjects.
For FutureTech2017, we received many paper submissions, and we acceptedonly articles with high quality for the FutureTech2017 proceedings after a rigorouspeer-reviewed process. All submitted papers have undergone blind reviews by atleast two reviewers from the technical program committee, which consists ofleading researchers around the globe. Without their hard work, achieving such ahigh-quality proceeding would not have been possible. We take this opportunity tothank them for their great support and cooperation. We would like to sincerelythank the following invited speakers who kindly accepted our invitations, and, inthis way, helped to meet the objectives of the conference: Prof. Weijia Jia, Directorof Cyber-Space Intelligent Computing Lab, Shanghai Jiaotong University, China,and Prof. Han-Chieh Chao, President of National Dong Hwa University, Taiwan.
vii
Finally, we would like to thank all of you for your participation in our conference,and also thank all the authors, reviewers, and organizing committee members.Thank you and enjoy the conference!
FutureTech 2017 Program ChairsChing-Hsien Hsu
Yunsick SungHoucine HassanKwang-il Hwang
Jin Wang
viii Message from the FutureTech2017 Program Chairs
Organization
Honorary Chair
Doo-soon Park SoonChunHyang University, Korea
Steering Chairs
James J. Park SeoulTech, KoreaYoung-Sik Jeong Dongguk University, Korea
General Chairs
Kim-Kwang RaymondChoo
The University of Texas at San Antonio, USA
Gangman Yi Dongguk University, KoreaJiannong Cao The Hong Kong Polytechnic University,
Hong Kong
Program Chairs
Ching-Hsien Hsu Chung Hua University, TaiwanYunsick Sung Dongguk University, KoreaHoucine Hassan Universitat Politecnica de Valencia, SpainKwang-il Hwang Incheon national University, KoreaJin Wang Yangzhou University, China
ix
Workshop Chairs
Chunho Jang Keimyung University, KoreaNeal N. Xiong Northeastern State University, USA
International Advisory Committee
James J. Park SeoulTech, Korea (Steering Chair)Doo-soon Park SoonChunHyang University, KoreaLaurence T. Yang St Francis Xavier University, CanadaJason C. Hung Oversea Chinese University, TaiwanJianhua Ma Hosei University, JapanC.S. Raghavendra University of Southern California, USAPhilip S. Yu University of Illinois at Chicago, USAHai Jin Huazhong University of Science and Technology,
ChinaYi Pan Georgia State University, USAShu-Ching Chen Florida International University, USAVictor Leung University of British Columbia, CanadaVincenzo Loia University of Salerno, ItalyHsiao-Hwa Chen National Cheng Kung University, Taiwan
Publicity Chairs
Yi Pan Georgia State University, USAVictor Leung University of British Columbia, CanadaVincenzo Loia University of Salerno, ItalyHsiao-Hwa Chen National Cheng Kung University, TaiwanLaurence T. Yang St Francis Xavier University, CanadaC.S. Raghavendra University of Southern California, USAPhilip S. Yu University of Illinois at Chicago, USAHai Jin Huazhong University of Science and Technology,
ChinaQun Jin Waseda University, JapanYang Xiao University of Alabama, USA
Program Committee
Abdelbadeeh Salem Ain Shams University, EgyptAlfredo Cuzzocrea University of Trieste, ItalyBing Chen Memorial University of Newfoundland, Canada
x Organization
Caldelli Roberto University of Florence, ItalyChi-Fu Huang National Chung-Cheng University, TaiwanEpaminondas Kapetanios University of Westminster, UKGuillermo Diaz-Delgado Autonomous University of Queretaro, MexicoHuang Kuo-Chan National Taichung University of Education, TaiwanHomenda Wladyslaw Warsaw University of Technology, PolandIrene Chang Shih-Hsin University, TaiwanJoel Rodrigues National Institute of Telecommunications, BrazilJeng-Shyang Pan Fujian University of Technology, ChinaJinli Cao La Trobe University, AustraliaJiqiang Lu Institute for Infocomm Research, SingaporeKyungbaek Kim Chonnam National University, KoreaMaumita Bhattacharya Charles Sturt University, AustraliaMudasser Wyne National University, USANiketa Gandhi University of Mumbai, IndiaQiang He Swinburne University of Technology, AustraliaRaylin Tso National Chengchi University, TaiwanRen-Song Ko National Chung Cheng University, TaiwanRoberto Caldelli University of Florence, ItalyRuben Rios University of Malaga, SpainRyszard Tadeusiewicz AGH University of Science and Tech., PolandSchahram Dustdar Technical University of Vienna, AustriaSeng Loke La Trobe University, AustraliaSoon M. Chung Wright State University, USAShu-Ching Chen Florida International University, USASuren Byna Lawrence Berkeley National Lab, USATatjana Davidovic Serbian Academy of Sciences and Arts, SerbiaWeichao Wang University of North Carolina at Charlotte, USAWookey Lee Inha University, KoreaYu-Chen Hu Providence University, TaiwanYunquan Zhang Chinese Academy of Sciences, ChinaZoubir Mammeri Paul Sabatier University, France
Organization xi
Message from the MUE2017 General Chairs
MUE 2017 is the 11th event of the series of international scientific conference. Thisconference will take place on May 22–24, 2017 in Seoul, South Korea. The aimof the MUE2017 is to provide an international forum for scientific research in thetechnologies and application of multimedia and ubiquitous engineering. Ever sinceits inception, International Conference on Multimedia and Ubiquitous Engineeringhas been successfully held as MUE-16 (Beijing, China), MUE-15 (Hanoi,Vietnam), MUE-14 (Zhangjiajie, China), MUE-13 (Seoul, Korea), MUE-12(Madrid, Spain), MUE-11 (Loutraki, Greece), MUE-10 (Cebu, Philippines),MUE-09 (Qingdao, China), MUE-08 (Busan, Korea), and MUE-07 (Seoul, Korea).
The conference papers included in the proceedings cover the following topics:Multimedia Modeling and Processing, Multimedia and Digital Convergence,Ubiquitous and Pervasive Computing, Ubiquitous Networks and MobileCommunications, Ubiquitous Networks and Mobile Communications, IntelligentComputing, Multimedia and Ubiquitous Computing Security, Multimedia andUbiquitous Services, and Multimedia Entertainment. Accepted and presentedpapers highlight new trends and challenges of multimedia and ubiquitous engi-neering. We hope readers will find these results useful and inspiring for their futureresearch.
We would like to express our sincere thanks to Steering Chair: James J. (JongHyuk) Park (SeoulTech, Korea). Our special thanks go to the Program Chairs:Naveen Chilamkurti (La Trobe University, Australia), Jungho Kang (SoongsilUniversity, Korea), Ka Lok Man, Xi’an(Jiaotong-Liverpool University, China),Joon-Min Gil(Catholic University of Daegu, Korea), all Program Committeemembers, and all reviewers for their valuable efforts in the review process thathelped us to guarantee the highest quality of the selected papers for the conference.
MUE2017 General ChairsShu-Ching Chen
Yi PanJianhua Ma
Young-Sik Jeong
xiii
Message from the MUE2017 Program Chairs
Welcome to the 11th International Conference on Multimedia and UbiquitousEngineering (MUE 2017), which will be held in Seoul, South Korea, on May22–24, 2017. MUE2017 will be the most comprehensive conference focused on thevarious aspects of multimedia and ubiquitous engineering. It will provide anopportunity for academic and industry professionals to discuss recent progress inthe area of multimedia and ubiquitous environment. In addition, the conference willpublish high-quality papers which are closely related to the various theories andpractical applications in multimedia and ubiquitous engineering. Furthermore, weexpect that the conference and its publications will be a trigger for further relatedresearch and technology improvements in these important subjects.
For MUE2017, we received many paper submissions, and we accepted onlyarticles with high quality for the MUE2017 proceedings after a rigorouspeer-reviewed process. All submitted papers have undergone blind reviews by atleast two reviewers from the technical program committee, which consists ofleading researchers around the globe. Without their hard work, achieving such ahigh-quality proceeding would not have been possible. We take this opportunity tothank them for their great support and cooperation. Finally, we would like to thankall of you for your participation in our conference, and also thank all the authors,reviewers, and organizing committee members. Thank you and enjoy theconference!
MUE 2017 Program ChairsNaveen Chilamkurti
Jungho KangKa Lok ManJoon-Min Gil
xv
Organization
Honorary Chair
Doo-soon Park SoonChunHyang University, Korea
Steering Chair
James J. Park SeoulTech, Korea
General Chairs
Shu-Ching Chen Florida International University, USAYi Pan Georgia State University, USAJianhua Ma Hosei University, JapanYoung-Sik Jeong Dongguk University, Korea
Program Chairs
Naveen Chilamkurti La Trobe University, AustraliaJungho Kang Soongsil University, KoreaKa Lok Man Xi’an Jiaotong-Liverpool University, ChinaJoon-Min Gil Catholic University of Daegu, Korea
xvii
Workshop Chairs
Kwangman Ko Sangji University, KoreaShuo Xu ISTIC, ChinaJun-Ho Huh Catholic University of Pusan, Korea
International Advisory Committee
Han-Chieh Chao National Ilan University, TaiwanWeijia Jia Shanghai Jiaotong University, ChinaBorko Furht Florida Atlantic University, USAThomas Plagemann University of Oslo, NorwayRoger Zimmermann National University of Singapore, SingaporeStephan Olariu Old Dominion University, USAKoji Nakano University of Hiroshima, Japan
Publicity Chairs
Kehua Guo Central South University, ChinaZhi Li Guizhou University, ChinaRuisheng Shi Beijing University of Posts and Telecommunications,
ChinaJaehwa Chung Korea National Open University, KoreaAyaz Ahmad COMSATS Institute of Information Technology,
PakistanQingchun Chen Southwest Jiaotong University, ChinaJunbo Wang University of Aizu, Japan
Program Committee
Afrand Agah West Chester University of Pennsylvania, USAAkihiro Sugimoto National Institute of Informatics, JapanAngel D. Sappa Universitat Autonoma de Barcelona, SpainBin Lu West Chester University, USAChao-Tung Yang Tunghai University, TaiwanChangsun Shin Sunchon National University, KoreaDaewon Lee SeoKyeong University, KoreaDakshina Ranjan Kisku National Institute of Technology Durgapur, IndiaDongkyun Kim KISTI, KoreaGuillermo Camara Chavez Universidade Federal de Minas Gerais, BrazilHari Om Indian School of Mines University, India
xviii Organization
HaRim Jung Sungkyunkwan University, KoreaHelen Huang The University of Queensland, AustraliaJoel Rodrigue National Institute of Telecommunications (Inatel),
BrazilJungong Han Northumbria University, UKKilhung Lee Seoul National University of Science
and Technology, KoreaKwang Sik Chung Korea National Open University, KoreaLukas Ruf Consecom AG, SwitzerlandMarco Cremonini University of Milan, ItalyMario Döller University of Applied Sciences, AustriaPaisarn Muneesawang Naresuan University, TaipeiPascal Lorenz University of Haute Alsace, FranceQuanqing Xu Data Storage Institute, A*STAR, SingaporeRachid Anane Coventry University, UKSeunghae Kim KISTI, KoreaSokratis Katsikas University of Piraeus, GreeceYong-Yoon Cho Sunchon National University, KoreaZheng-Jun Zha National University of Singapore, Singapore
Organization xix
Contents
Single Password Authentication Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 1Pramote Kuacharoen
Performance Analysis of Congestion Control for MassiveMTC Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Yi-Yen Chen, Yu-Chee Tseng, and Jyh-Cheng Chen
How to Train People to Increase Their Security Awareness in IT . . . . . 12Agata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek,and Adam Wierzbicki
Advanced Data Communication Framework for Cloud Computingfrom CDMI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Jae-Yun Jeong and Jae-Woong Jeong
A Study of AI Based E-learning System and Application . . . . . . . . . . . . 24Min-Gyu Shim and Jae-Woong Jeong
A Study on the Serious Issues in the Practice of Information Securityin IT: With a Focus on Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Junhak Lee and Jae-Woong Jeong
Mobile App for Analyzing Environmental Visual Parameterswith Life Logging Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Hyeonsang Hwang, Daejune Ko, Mincheol Whang, and Eui Chul Lee
Fake Fingerprint Detection Based on Statistical Moments . . . . . . . . . . . . 43Yosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko,and Eui Chul Lee
Path Planning Method for Collision Avoidance of Multiple UAVs . . . . . 49Hyeok Kim, Jeonghoon Kwak, Guichang Sim, and Yunsick Sung
xxi
3D UAV Flying Path Optimization Method Basedon the Douglas-Peucker Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Guichang Sim, Jaehwa Chung, and Yunsick Sung
Encrypted Network Traffic Analysis Method via Secure Socket LayerHandshake Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Jihoon Yoon, Kangsik Shin, and Yoojae Won
Property Analysis of SMS Spam Using Text Mining . . . . . . . . . . . . . . . . 67Manki Baek, Youngkyung Lee, and Yoojae Won
An Automatic Patch Management System with Improved Security . . . .. . . . 74JunHee Kim, MinSeok Sohn, and YooJae Won
An Empirical Study on the Relationship Between User InterfaceDesign Attributes in Smartphone Applicationsand Intention to Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81Wonjin Jung and HyungRok Yim
Thumb Biometric Using Scale Invariant Feature Transform . . . . . . . . . 85Naeun Lim, Daejune Ko, Kun Ha Suh, and Eui Chul Lee
Image Classification Using Color and Spatial Frequencyin Terms of Human Emotion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Min Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon,and Eui Chul Lee
Human Robot Interaction Method by Using HandGesture Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Jaehyun Han, Woohyuk Jang, Dojoon Jung, and Eui Chul Lee
A Beacon-Based User Direction Estimating Methodin Indoor Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Jeonghoon Kwak and Yunsick Sung
User Selection Based Backpropagation for Siamese Neural Networksin Visual Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Hanju Park and Sukho Lee
Methodological Route to Designing Optimized Bedroom Environmentfor Active-Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Sung Jun Park
Grayscale and Halftone Gel Lithography as PromisingTechniques for Swelling-Induced Deformation of SmartPolymer Hydrogel Films . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Myunghwan Byun
xxii Contents
Methodology for Improving Usability Model of Multiple Devices . . . . . . 126Jeyoun Dong and Myunghwan Byun
Development of SMART Base Isolation Using LinearMotion Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Chunho Chang and Sangyoung Shin
Analysis on Work Zone Characteristics in South Korean ExpresswaysUsing Text Mining Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Oh Hoon Kwon, Je-Jin Park, and Shin Hyoung Park
Seismic Performance Evaluation of a Prestressed I-Type GirderBridge in Daegu for ICT Based Disaster Management in DaeguMetropolitan City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140Chunho Chang, Sung Jig Kim, and Shin Hyoung Park
Implementation of Sitting Posture Monitoring Systemwith Kinect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144Dong-Jun Shin, Min-Sang Kim, Wook Song, Se Dong Min, and Min Hong
Solving the Subgraph Isomorphism ProblemUsing Harmony Search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151Hoyeong Yun, Yongjoon Joe, Byung-Ok Jung, Hyoguen Bang,and Dongmyung Shin
Persuading Recommendations Using Customized Content Curation. . . .. . . . 159Keonsoo Lee and Yunyoung Nam
Improving the Quality of an R-Tree Usingthe Map-Reduce Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164Viet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon,and Ha-Joo Song
An Energy-Efficient and Reliable Routing Protocol for CognitiveRadio Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Zamree Che-aron
A Novel on Automatic K Value for Efficiency Improvementof K-means Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, and Chun-Bo Sim
Study on Integrity Verification and Compatibility-Conflict Analysisfor Safe Patching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Jeongmin An, Sangmoon Jung, and Yoojae Won
OFART: OpenFlow-Switch Adaptive Random Testing . . . . . . . . . . . . . . 193Dong-Su Koo and Young B. Park
Patch Alarm and Collecting System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Jaegeun Oh, Chaeho Cho, and Yoojae Won
Contents xxiii
Method of Building a Security Vulnerability Information Collectionand Management System for Analyzing the Security Vulnerabilitiesof IoT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205Kisu Kim, Jongsoo Lee, and Wonkang Jung
A Cluster Head Selection Method by Restricting Selection Areain Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211Jong Won Lee, JiSu Park, Heung-Keun Kim, and Jin Gon Shon
An Improved Pedestrian Detection System that Utilizesthe HOG-UDP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218Pyeong-Kang Kim, Hyung-Heon Kim, and Tae-Woo Kim
An Approach to Fast Protocol Information Retrievalfrom IoT Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226Onur Soyer, Kwan-Young Park, Nomota Hiongun Kim, and Tae-soo Kim
IoT Vulnerability Information Sharing System. . . . . . . . . . . . . . . . . . . . . 233Taeho Seo
A Study on the Service Identification of Internet-Connected DevicesUsing Common Platform Enumeration . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Sarang Na, Taeeun Kim, and Hwankuk Kim
A Design of IoT Protocol Fuzzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Dae-il Jang, Taeeun Kim, and HwanKuk Kim
A Study on the Management Structure of Vulnerability Informationin IoT Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Eunhye Ko, Taeeun Kim, and Hwankuk Kim
Assessing the Impact of DoS Attacks on IoT Gateway. . . . . . . . . . . . . . . 252Yungee Lee, Wangkwang Lee, Giwon Shin, and Kyungbaek Kim
Low-Cost Infrared Video-Oculography for Measuring RapidEye Movements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Youngsun Kong, Hyeonsoo Lee, Namik Kim, Seungyeon Lee,Jihwan Park, Taeyang Han, and Yunyoung Nam
VM Relocation Method for Increase the Resource Utilizationin Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Sangwook Han, MinSoo Chae, and Hwamin Lee
Challenges and Experiment with LoRaWAN . . . . . . . . . . . . . . . . . . . . . . 269Seung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim,and Byoung-Sup Shim
Consumer’s Behavioral System of Approach and AvoidanceInvestigating Generic Medicine Distribution and Logistics in Japan. . . .. . . . 277Takefumi Hosoda and Hongsik J. Cheon
xxiv Contents
Cross-Conforming Approaches of ICT Functionality Designfor Smart City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Jae-Young Ahn, Eunjun Rhee, Hyun-Woo Lee, and Dae Joon Hwang
GUI-Based Korean Font Editing System Using FontParameterization Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Minju Son, Gyeongjae Gwon, Geunho Jeong, and Jaeyoung Choi
Spatial Big Data Analysis System for Vehicle-DrivingGPS Trajectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Wonhee Cho and Eunmi Choi
i-SHSS: An IoT Based Smart Home Security System . . . . . . . . . . . . . . . 303Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon,and Jong Hyuk Park
The VM Weighted Filter Scheduling Algorithmfor OpenStack Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307Mohan Krishna Varma Nandimandalam and Eunmi Choi
A Hierarchical Motion Estimation Based on the Properties of MotionVectors for Low Complexity in Video Coding . . . . . . . . . . . . . . . . . . . . . 314Hyo-Sun Yoon and Mi-Young Kim
Research on Method of Technological Evolution AnalysisBased on HLDA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Liang Chen, Xiaoping Lei, Guancan Yang, and Jing Zhang
A Mixture Record Linkage Approach for US PatentInventor Disambiguation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331Guan-Can Yang, Cheng Liang, Zhang Jing, Dao-Ren Wang,and Hai-Chao Zhang
The LTC Framework for Competitive Analysison Industrial Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339Hongqi Han, Changqing Yao, Maoxiang Peng, and Yongsheng Yu
Bayesian Multinomial Naïve Bayes Classifier to Text Classification . . . .. . . . 347Shuo Xu, Yan Li, and Zheng Wang
CERIF: A Research Information Model for Electric Vehicles DecisionSupport System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353YingJie Zhang and Na Qi
On Bypassing Page Cache for Block Deviceson Storage Class Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361Jin Baek Kwon
Contents xxv
Applying Tensorflow with Convolutional Neural Networks to TrainData and Recognize National Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367Hoang Huu Duc and Keechul Jung
An Empirical Study on the Effect of the Interpretability of Metaphorsin UI on the Learnability of Mobile Apps . . . . . . . . . . . . . . . . . . . . . . . . . 374Wonjin Jung and HyungRok Yim
A Density-Aware Data Encryption Scheme with Query Auditing Indexfor Secure Mobile Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Moon-Hwan Kang, Min Yoon, and Jae-Woo Chang
A Kernel Density Estimation Model for Moving Object Detection . . . . . 386Yulong Qiao and Wei Xi
Detecting Bases of Maximal Cliques in a Graph . . . . . . . . . . . . . . . . . . . 393Fei Hao, Doo-Soon Park, and Zheng Pei
Forecasting Cultivable Region-Specific Crops Based on FutureClimate Change Utilizing Public Big Data . . . . . . . . . . . . . . . . . . . . . . . . 399Yoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim,Sang Yub Han, Kee Hwan Kim, and Sungkap Cho
Statistical Analysis of Determinants of Intention to Use Virtual RealityServices and Moderating Effects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Young-Ho Hwang and Yoo-Jin Moon
Real-Time Human Depression Diagnosis System Using BrainWave Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412Dongmin Shin, Yunjin Nam, Dongil Shin, and Dongkyoo Shin
Deep Belief Network Based on Double Weber Local Descriptorin Micro-expression Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419Xiao-li Hao and Miao Tian
Design for Network File Forensics System Basedon Approximate Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426Aonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, and Gang Xiong
The Comparative Analysis of the Repeat Regions fromthe Assembled Contigs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432Jaehee Jung
Senior Tourism and Information and CommunicationTechnologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440Blanka Klimova
Wearable and Portable Monitoring Devices for Older People . . . . . . . . . 446Blanka Klimova and Petra Maresova
xxvi Contents
A Novel Anomaly Detection Method in Wireless NetworkUsing Multi-level Classifier Ensembles . . . . . . . . . . . . . . . . . . . . . . . . . . . 452Bayu Adhi Tama and Kyung-Hyune Rhee
Learning Reaction Analysis Engine for Interactive DigitalTextbook Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459Kwang Sik Chung
Rule-Based Topic Trend Analysis by Using DataMining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466Yunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon,Hansaem Park, and In-Jeong Chung
A Case Study of Hierarchical Safety Analysis for ElicitingTraceable Safety Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474Daehui Jeong, Anit Thapaliya, and Gihwon Kwon
Smart Home Technology and Energy Savings with a SpecialFocus on Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481Blanka Klimova, Petra Maresova, and Ondrej Krejcar
Senior Citizens’ Views of Using Medical Technologies – Case Studyin Central Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Petra Maresova and Jaroslav Kacetl
Audiences Counting in Cinema by Detecting Occupied Chairs . . . . . . . . 493Zhitong Su, Jun Lan, Wei Song, Simon Fong, and Yifei Tian
Efficient Distributed Index Structure and Encrypted Query ProcessingScheme for Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . 499Yeonwoo Jang, Hyunjo Lee, and Jae-Woo Chang
A Data Encryption Scheme Using Periodic Functions for EfficientQuery Processing on Encrypted Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506Hyunjo Lee, Youngho Song, and Jae-Woo Chang
Software Product Line Lifecycle Management-IntegrationEngineering and Management Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 513Jeong Ah Kim and Jin Seok Yang
OLSR Improvement with Link Live Time for FANETs . . . . . . . . . . . . . 521Yan Jiao, Wenyu Li, and Inwhee Joe
An Efficient Partition-Based Filtering for Similarity Joinson MapReduce Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Miyoung Jang, Archana B. Lokhande, Naeun Baek, and Jae-Woo Chang
A Study of Algorithm Replacement Mechanism for EnvironmentAdaptive Load Balancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534JongMin Lee and Young B. Park
Contents xxvii
Face Recognition Based on Enhanced CSLBP . . . . . . . . . . . . . . . . . . . . . 539Chen Li, Shuai Zhao, Ke Xiao, and Yanjie Wang
A Supporting Environment for Formal Analysisof Cryptographic Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, and Jingde Cheng
Modeling and Simulation of LoRa in OPNET . . . . . . . . . . . . . . . . . . . . . 551Andrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee,Inwhee Joe, Kyeseon Lee, and Tae-Joon Park
Dynamic Analysis Bypassing Malware Detection Method UtilizingMalicious Behavior Visualization and Similarity . . . . . . . . . . . . . . . . . . . 560Jihun Kim and Jonghee M. Youn
Mongolian Internet Consumers’ Attitude TowardsWeb Advertising . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566Bulganmaa Togookhuu, Junxing Zhang, and Wuyungerile Li
A Study on the Quantitative Design and Documentationfor the VR Based Training Contents Realism . . . . . . . . . . . . . . . . . . . . . . 573Gyungchang Lee, Kyoil Chung, and Cheong Youn
Progressive Motion Artifact Removal in PPG Signal for AccurateHeart Rate Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580Ji Hun An, Heemang Song, and Hyun-Chool Shin
A Case Study on How to Predict Café Profit: A Dimension Reductionvia Factor Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588Jeong-Hyeon Moon, Chae-Young Yun, Seon-Joo Park,and Kyung-Ah Sohn
Motion Blurred Shadows Using a Hybrid Approach . . . . . . . . . . . . . . . . 594MinhPhuoc Hong and Kyoungsu Oh
Design of ECG Data Compression Algorithm for Efficient M2M-BasedMass Biometric Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601Jae-Sung Shim, Seung-Su Yang, Young-Hwan Jang, Yong-Wan Ju,and Seok-Cheon Park
Design of Clustering Algorithm for Efficient Energy Managementin Wireless Sensor Network Environments . . . . . . . . . . . . . . . . . . . . . . . . 607Seung-Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju,and Seok-Cheon Park
Design of a Framework for Security Enhancement in TelematicsControl Units (TCUs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Kiyoung Jang, Suhong Shin, and Byoungsoo Koh
xxviii Contents
Improved Data Stream Clustering Algorithmfor Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620Chunyong Yin, Sun Zhang, and Jin Wang
Application of an Improved Data Stream Clustering Algorithmin Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626Chunyong Yin, Lian Xia, and Jin Wang
Short Text Classification Technology Basedon KNN+Hierarchy SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633Chunyong Yin, Lingfeng Shi, and Jin Wang
Spectral Response Based Regularization Parameter Selection for TotalVariation Image Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640Yuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, and Jin Wang
Face Recognition for Mobile Self-authenticationwith Online Model Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646Seon Ho Oh and Geon-Woo Kim
Prototype System Design for Large-Scale Person Re-identification . . . . . 649Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi, and Geon-Woo Kim
Topic Modeling for Learner Question and Answer Analytics . . . . . . . . . 652Kyungrog Kim, Hye Jin Song, and Nammee Moon
A Model of Energy-Awareness Predictor to Improvethe Energy Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656Svetlana Kim and Yong-Ik Yoon
A Novel Structure Tensor Using Nonlocal TotalVariation Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663Yin Yu, Kai Ma, Yuhui Zheng, and Jin Wang
Gaussian Mixture Model Based Image Denoising Methodwith Local Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670Min Li, Yuhui Zheng, Shunfeng Wang, and Jin Wang
A Study on Secure Protocol Techniques Supporting TCUsin a Telematics Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676Byoungsoo Koh and Suhong Shin
Development of Test Agents for Automated Dynamic Testingof UNIWAY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683Seoung-Hyeon Lee and Jung-Chan Na
Multi-step Prediction for Time Series with Factor Miningand Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689Mingji Zhou, Jin Liu, Fei Li, and Jin Wang
Contents xxix
A Vision-Based Approach for Deep Web Form Extraction . . . . . . . . . . . 696Jiachen Pu, Jin Liu, and Jin Wang
Questions Classification with Attention Machine . . . . . . . . . . . . . . . . . . . 703Yunlu Liaozheng, Jin Liu, and Jin Wang
Development of Unidirectional Security Gateway Satisfying SecurityFunctional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709Seon-Gyoung Sohn, Jungchan Na, and Kyung-Soo Lim
Context Based Multiple Players Identification in Sports Images . . . . . . . 715MiYoung Nam, Jun-Young Lee, Sung Youb Kim, and YoungGiu Jung
A Study of the Factors Influencing Information Security PolicyCompliance: Focusing on the Case of ‘K’ Institute . . . . . . . . . . . . . . . . . 720Gwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil,and Hark-Soo Park
Safe-Driving Aid System Using Bi-directional Cameras . . . . . . . . . . . . . . 729Byoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon,and Jong Hyuk Park
Telling Computer and Human Apart: Image-Sound BasedCAPTCHA System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733Jung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, and Jong Hyuk Park
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
xxx Contents