Advanced multimedia and ubiquitous engineering : MUE/FutureTech 2017 /: MUE/FutureTech 2017. (2017)
- Record Type:
- Book
- Title:
- Advanced multimedia and ubiquitous engineering : MUE/FutureTech 2017 /: MUE/FutureTech 2017. (2017)
- Main Title:
- Advanced multimedia and ubiquitous engineering : MUE/FutureTech 2017
- Other Titles:
- MUE/FutureTech 2017
- Further Information:
- Note: James J. (Jong Hyuk) Park, Shu-Ching Chen, Kim-Kwang Raymond Choo, editors.
- Editors:
- Park, James J
Chen, Shu-Ching, 1963-
Choo, Kim-Kwang Raymond - Other Names:
- FutureTech (Conference), 12th
- Contents:
- Message from the FutureTech2017 General Chairs; Message from the FutureTech2017 Program Chairs; Organization; Contents; Single Password Authentication Protocol; Abstract; 1 Introduction; 2 Background and Related Work; 2.1 Password Authentication; 2.2 Single Password Protocols; 3 Proposed Authentication Scheme; 3.1 Storing Passwords; 3.2 The Protocol; 4 Security Analysis; 4.1 Compromised Password Attack; 4.2 Replay Attack; 4.3 Phishing and Man-in-the-Middle Attacks; 5 Conclusion; References; Performance Analysis of Congestion Control for Massive MTC Networks; Abstract; 1 Introduction. 1.1 Related Works2 Our Critical Red Method; 2.1 Congestion Point Due to Massive MTC Devices; 2.2 Critical Random Early Detection (CRED) Method; 3 Simulation; 3.1 Simulation Settings; 3.2 Throughput; 4 Conclusion; References; How to Train People to Increase Their Security Awareness in IT; Abstract; 1 Introduction; 2 Related Work; 3 Model; 3.1 Step 1 -- Defining Social Network of Co-workers; 3.2 Step 2 -- Defining the Required Costs of the Training; 3.3 Step 3 -- Defining Method of Teaching; 3.4 Step 4 -- Defining Desired Result; 3.5 Step 5 -- Evaluation of Workers Security Awareness. 3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMIMessage from the FutureTech2017 General Chairs; Message from the FutureTech2017 Program Chairs; Organization; Contents; Single Password Authentication Protocol; Abstract; 1 Introduction; 2 Background and Related Work; 2.1 Password Authentication; 2.2 Single Password Protocols; 3 Proposed Authentication Scheme; 3.1 Storing Passwords; 3.2 The Protocol; 4 Security Analysis; 4.1 Compromised Password Attack; 4.2 Replay Attack; 4.3 Phishing and Man-in-the-Middle Attacks; 5 Conclusion; References; Performance Analysis of Congestion Control for Massive MTC Networks; Abstract; 1 Introduction. 1.1 Related Works2 Our Critical Red Method; 2.1 Congestion Point Due to Massive MTC Devices; 2.2 Critical Random Early Detection (CRED) Method; 3 Simulation; 3.1 Simulation Settings; 3.2 Throughput; 4 Conclusion; References; How to Train People to Increase Their Security Awareness in IT; Abstract; 1 Introduction; 2 Related Work; 3 Model; 3.1 Step 1 -- Defining Social Network of Co-workers; 3.2 Step 2 -- Defining the Required Costs of the Training; 3.3 Step 3 -- Defining Method of Teaching; 3.4 Step 4 -- Defining Desired Result; 3.5 Step 5 -- Evaluation of Workers Security Awareness. 3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMI Framework Proposal; 4 Evaluation; 5 Conclusion; References; A Study of AI Based E-learning System and Application; Abstract; 1 Introduction; 2 Relevant Previous Studies; 3 Research Methods and Procedures; 3.1 Research Panel Configuration; 3.2 Data Processing; 4 Results and Analysis. 5 ConclusionReferences; A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware; Abstract; 1 Introduction; 2 Computer Virus; 3 Ransomware and Its Risk; 3.1 Ransomware; 3.2 The Risk of Ransomware; 4 Questionnaire and Evaluation; 5 Conclusion; References; Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera; Abstract; 1 Introduction; 2 Visual Parameters; 2.1 Color Analysis; 2.2 Analyzing Spatial Complexity; 3 Image Processing with Android; 4 Implementation and Feasibility Test; 5 Conclusion; Acknowledgement; References. Fake Fingerprint Detection Based on Statistical MomentsAbstract; 1 Introduction; 2 Proposed Method; 2.1 Feature Extractions; 2.2 Fusing Features Using SVM; 3 Experimental Results; 4 Conclusion; Acknowledgements; References; Path Planning Method for Collision Avoidance of Multiple UAVs; Abstract; 1 Introduction; 2 Multiple UAV Control for Collision Avoidance; 2.1 UAV Flight Data Records; 2.2 Path Revision Computations; 2.3 Collision Avoidance Path Planning; 3 Experiments; 3.1 Three-Dimensional Experiments Scenario and UAV Flight Data Record; 3.2 Path Revision Computation. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xxx, 740 pages), illustrations
- Subjects:
- 004
Information technology -- Congresses
Multimedia systems -- Congresses
Ubiquitous computing -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Information technology
Multimedia systems
Ubiquitous computing
Engineering
Computational Intelligence
Computer Communication Networks
Multimedia Information Systems
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811050411
9811050414 - Related ISBNs:
- 9789811050404
9811050406 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 18, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.406059
- Ingest File:
- 02_476.xml