Advanced multimedia and ubiquitous engineering : MUE/FutureTech 2017

This book presents the proceedings of the 11th International Conference on Multimedia and Ubiquitous Engineering (MUE2017) and the 12th International Conference on Future Information Technology (FutureTech2017), held in Seoul, South Korea on May 22-24, 2017. These two conferences provided an opportu...

Full description

Saved in:
Bibliographic Details
Corporate Author FutureTech (Conference) Seoul, Korea)
Other Authors Park, James J. (Editor), Chen, Shu-Ching, 1963- (Editor), Choo, Kim-Kwang Raymond (Editor)
Format Electronic eBook
LanguageEnglish
Published Singapore : Springer, 2017.
SeriesLecture notes in electrical engineering ; v. 448.
Subjects
Online AccessPlný text

Cover

Loading…
Table of Contents:
  • Message from the FutureTech2017 General Chairs; Message from the FutureTech2017 Program Chairs; Organization; Contents; Single Password Authentication Protocol; Abstract; 1 Introduction; 2 Background and Related Work; 2.1 Password Authentication; 2.2 Single Password Protocols; 3 Proposed Authentication Scheme; 3.1 Storing Passwords; 3.2 The Protocol; 4 Security Analysis; 4.1 Compromised Password Attack; 4.2 Replay Attack; 4.3 Phishing and Man-in-the-Middle Attacks; 5 Conclusion; References; Performance Analysis of Congestion Control for Massive MTC Networks; Abstract; 1 Introduction.
  • 1.1 Related Works2 Our Critical Red Method; 2.1 Congestion Point Due to Massive MTC Devices; 2.2 Critical Random Early Detection (CRED) Method; 3 Simulation; 3.1 Simulation Settings; 3.2 Throughput; 4 Conclusion; References; How to Train People to Increase Their Security Awareness in IT; Abstract; 1 Introduction; 2 Related Work; 3 Model; 3.1 Step 1
  • Defining Social Network of Co-workers; 3.2 Step 2
  • Defining the Required Costs of the Training; 3.3 Step 3
  • Defining Method of Teaching; 3.4 Step 4
  • Defining Desired Result; 3.5 Step 5
  • Evaluation of Workers Security Awareness.
  • 3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMI Framework Proposal; 4 Evaluation; 5 Conclusion; References; A Study of AI Based E-learning System and Application; Abstract; 1 Introduction; 2 Relevant Previous Studies; 3 Research Methods and Procedures; 3.1 Research Panel Configuration; 3.2 Data Processing; 4 Results and Analysis.
  • 5 ConclusionReferences; A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware; Abstract; 1 Introduction; 2 Computer Virus; 3 Ransomware and Its Risk; 3.1 Ransomware; 3.2 The Risk of Ransomware; 4 Questionnaire and Evaluation; 5 Conclusion; References; Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera; Abstract; 1 Introduction; 2 Visual Parameters; 2.1 Color Analysis; 2.2 Analyzing Spatial Complexity; 3 Image Processing with Android; 4 Implementation and Feasibility Test; 5 Conclusion; Acknowledgement; References.
  • Fake Fingerprint Detection Based on Statistical MomentsAbstract; 1 Introduction; 2 Proposed Method; 2.1 Feature Extractions; 2.2 Fusing Features Using SVM; 3 Experimental Results; 4 Conclusion; Acknowledgements; References; Path Planning Method for Collision Avoidance of Multiple UAVs; Abstract; 1 Introduction; 2 Multiple UAV Control for Collision Avoidance; 2.1 UAV Flight Data Records; 2.2 Path Revision Computations; 2.3 Collision Avoidance Path Planning; 3 Experiments; 3.1 Three-Dimensional Experiments Scenario and UAV Flight Data Record; 3.2 Path Revision Computation.