29
Author Index A Ahn, Kyung Jin, 305 Almuairfi, Sadiq, 11 Alnumay, Waleed S., 1 Aritsugi, Masayoshi, 169 B Bae, NamJin, 669, 833 Biçakçi, Mert, 65 Bong, Wonsun, 453, 505 Bu, Heehyung, 37 Bui, Tuan-Anh, 211 Burgstaller, Bernd, 719 Byun, Yun Sang, 515 C C ȣ akir, Mehmet Ulas ȣ, 65 Chae, Seung-Hoon, 677 Chang, Beom-Hwan, 535 Chang, Ku-Young, 347 Chatterjee, Pushpita, 1 Chen, Guey-Shya, 337 Chen, Hsing-Lung, 119 Chen, Huaming, 321 Chen, Ming-Sze, 119 Chilamkurti, Naveen, 11 Cho, Hong, 763 Cho, Kyungeun, 597, 661, 731 Cho, Seoungjae, 597, 661, 731 Cho, YongYun, 669, 833 Choi, Byong-Sam, 853 Choi, Hyung Rim, 863 Choi, Jung-Won, 103, 111 Choi, Kyu-Jin, 447 Choi, Mi-Jung, 575 Choi, Young-Hwan, 261 Chun, Se-Hak, 853 Chung, Kidong, 297 Chung, Tai-Myoung, 535, 553 Chung, Yongwha, 677 E Elovici, Yuval, 439 Eun, Kim Gyoung, 707 F Fang, Yung-Chin, 127 G Gao, Yuxiang, 127 Ghosh, Uttam, 1 Goswami, Kalyan, 271 Guri, Mordechai, 439 H Ham, Hyo-Sik, 575 Han, Youngshin, 43 Hang, Su, 719 Heo, Gyunyoung, 87 Hong, Bonghee, 203 Hong, Chee Ken, 875 Hong, Dowon, 347 Hong, Gwang-Soo, 821 Hong, Sangjin, 799 Hong, Soon Goo, 863 Hong, Youn-Sik, 75 Hoong, Poo Kuan, 875 Hoseini, Zaniar, 289 Hu, Jun, 321 Hu, Shu-Hua, 119 J. J. (Jong Hyuk) Park et al. (eds.), Frontier and Innovation in Future Computing and Communications, Lecture Notes in Electrical Engineering 301, DOI: 10.1007/978-94-017-8798-7, ȑ Springer Science+Business Media Dordrecht 2014 895

Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

  • Upload
    dophuc

  • View
    225

  • Download
    4

Embed Size (px)

Citation preview

Page 1: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Author Index

AAhn, Kyung Jin, 305Almuairfi, Sadiq, 11Alnumay, Waleed S., 1Aritsugi, Masayoshi, 169

BBae, NamJin, 669, 833Biçakçi, Mert, 65Bong, Wonsun, 453, 505Bu, Heehyung, 37Bui, Tuan-Anh, 211Burgstaller, Bernd, 719Byun, Yun Sang, 515

CC�akir, Mehmet Ulas�, 65Chae, Seung-Hoon, 677Chang, Beom-Hwan, 535Chang, Ku-Young, 347Chatterjee, Pushpita, 1Chen, Guey-Shya, 337Chen, Hsing-Lung, 119Chen, Huaming, 321Chen, Ming-Sze, 119Chilamkurti, Naveen, 11Cho, Hong, 763Cho, Kyungeun, 597, 661, 731Cho, Seoungjae, 597, 661, 731Cho, YongYun, 669, 833Choi, Byong-Sam, 853Choi, Hyung Rim, 863Choi, Jung-Won, 103, 111Choi, Kyu-Jin, 447Choi, Mi-Jung, 575Choi, Young-Hwan, 261

Chun, Se-Hak, 853Chung, Kidong, 297Chung, Tai-Myoung, 535, 553Chung, Yongwha, 677

EElovici, Yuval, 439Eun, Kim Gyoung, 707

FFang, Yung-Chin, 127

GGao, Yuxiang, 127Ghosh, Uttam, 1Goswami, Kalyan, 271Guri, Mordechai, 439

HHam, Hyo-Sik, 575Han, Youngshin, 43Hang, Su, 719Heo, Gyunyoung, 87Hong, Bonghee, 203Hong, Chee Ken, 875Hong, Dowon, 347Hong, Gwang-Soo, 821Hong, Sangjin, 799Hong, Soon Goo, 863Hong, Youn-Sik, 75Hoong, Poo Kuan, 875Hoseini, Zaniar, 289Hu, Jun, 321Hu, Shu-Hua, 119

J. J. (Jong Hyuk) Park et al. (eds.), Frontier and Innovation in Future Computingand Communications, Lecture Notes in Electrical Engineering 301,DOI: 10.1007/978-94-017-8798-7, � Springer Science+Business Media Dordrecht 2014

895

Page 2: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Huang, Jiun-Long, 49Huang, Yi-Hung, 329Huh, Eui-Nam, 211Hung, Jason C., 321, 329Hung, Pham Phuoc, 211Hur, Junbeom, 229Hwang, Eenjun, 261Hwang, Kwang-il, 495Hwang, Soon-Hak, 853Hwang, Won-Joo, 21

IIm, Subin, 615

JJang, Si-Hwan, 57Jang, Uijin, 473, 565Jang, WonAng, 247Jang, Won-Chul, 177Jang, Yu-Jong, 643Jeong, Chisoon, 719Jeong, Hohyeon, 739Jeong, Hwa-Young, 313Jeong, In-Kyu, 153Jeong, Jaehoon (Paul), 739Jeong, Kanghun, 423Jeong, Young-Sik, 313, 467Jhang, Kyoung-Sun, 525Jho, Nam-Su, 347Jin, Daxing, 597Jo, Woo-Seung, 447Joo, Sang-Hyun, 401, 57Jung, ByungOk, 587Jung, Daeyong, 483Jung, Euihyun, 605Jung, Jaehee, 305, 785Jung, Jai-Jin, 313Jung, Woo-Tak, 95

KKang, Dong-Ho, 525, 535Kang, Min-A, 447Kang, Myeongsu, 135, 153, 161, 177, 193, 393Kang, Won Min, 313Karumathil, Aadarsh, 885Kim, Byeong-Woo, 763Kim, Byoung-Koo, 525, 535Kim, Byung Wook, 29Kim, Byung-Gyu, 271, 289, 29, 821

Kim, Byun-Gon, 103, 111Kim, Cheol-Hong, 153, 193Kim, Cheonshik, 697Kim, Daehoon, 261Kim, Daekeun, 297Kim, Dong-Hoon, 75Kim, Hwa Jong, 357Kim, Hwan-Hee, 575Kim, Hyun Jong, 863Kim, Hyunjoo, 553Kim, Hyun-jung, 383Kim, Hyun-Woo, 467Kim, Ikkyun, 553Kim, Jaehyo, 615Kim, Jaekwon, 43Kim, Jeong Ah, 409Kim, Jeong Nyeo, 279Kim, Jinuk, 615Kim, Jonghwa, 37Kim, Jong-Myon, 135, 153, 161, 177, 193, 393Kim, Juyoung, 605Kim, Kwan-Woong, 103, 111Kim, Kyungsup, 95Kim, Myung Ho, 365Kim, Myung-Sup, 575Kim, Sanghoon, 423, 687Kim, Sungho, 37Kim, Sung-Soo, 57Kim, Taeyoung, 43Kim, Yong Cheol, 453, 505Kim, Yong-Kab, 103, 111Kim, Young-Hyuk, 221Kitasuka, Teruaki, 169Ko, Kwangman, 843Ko, Young-Woong, 853Koh, Byoung-Soo, 587Koo, Dongyoung, 185, 229Koo, Insoo, 145Krasner, Anatoly, 439Kwak, Jin, 515, 643Kwak, KyungHun, 669, 833Kweon, JuWan, 247Kwon, Gihwon, 415, 431Kwon, Jihye, 615Kwon, Ki-Ryong, 21Kwon, Ohmin, 185Kwon, Ryoungkwo, 431

LLee, Chang-hun, 383Lee, ChangYong, 247

896 Author Index

Page 3: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Lee, DoHoon, 247Lee, Eung-Joo, 21Lee, Eunseok, 739Lee, GiYeol, 809Lee, Goo Yeon, 357Lee, Gwanghyung, 253Lee, Hae-Yeoun, 401Lee, Heung Ki, 305, 785Lee, HwaMin, 809Lee, Hyun Mi, 863Lee, Jae Dong, 313Lee, Jae-Gwang, 221Lee, Jae-Kwang, 221Lee, Jae-Pil, 221Lee, Jeesoo, 687Lee, Ji-Won, 401Lee, Jong-Hyeok, 271Lee, Jongsik, 43Lee, Jung-Ryun, 773Lee, Jung-Won, 739Lee, Ki Young, 75Lee, Kye-Shin, 289Lee, Kyu-Chul, 447Lee, Kyungmin, 203Lee, Min-Feng, 337Lee, Sang-Young, 461Lee, Seongyoon, 615Lee, Seung-Hwan, 751Lee, Suk-Hwan, 21Lee, Yong, 357Lim, Hyungmin, 473Lim, Il-Kown, 221Lim, JongBeom, 483Lim, Joonhyung, 605Lin, Kuan-Cheng, 329Lin, Yung-Tso, 329Liu, Hongzhe, 731Lu, Yuqian, 237

MMafole, Prosper, 169Manabe, Yuki, 169Moon, Chang Hyun, 313Moon, Hae-Min, 677Moon, Hyeonjoon, 423Moon, Nammee, 799

NNa, Jung-Chan, 525, 535Nam, Sung-wook, 495Namgung, Hyun, 221Nasridinov, Aziz, 653

OOh, Jung-Min, 799

PPan, Sung Bum, 677Park, Chang-hyun, 863Park, DooSoon, 809Park, JinGwan, 247Park, Jong Hyuk, 313Park, Keon-Jun, 103, 111Park, Minoh, 43Park, Namje, 545Park, PyungKoo, 373Park, Sachoun, 415Park, Sang-Hyun, 773Park, Su-Wan, 279Park, Yong-Hun, 135Park, Young-Ho, 653Piao, Yongxu, 203

QQi, Ji, 321

RRew, Jehyeok, 261Rho, Seungmin, 261Ryong, Beak, 821Ryou, JaeCheol, 373, 95Ryu, HoYong, 373

SSenthil Kumar, T., 885Seo, Junsang, 161, 193Seo, SangHo, 587Seok, Seung-Joon, 751Shao, Qun, 237Shin, Dongil, 253Shin, Dongkyoo, 253Shin, JinSeop, 373Shin, Jinsoo, 87Shin, Kwangmu, 297Shin, Yongjoo, 185Shon, Dongkoo, 161Singh, Chirpreet, 237Son, Hanseong, 87Son, Yun-Hee, 447Song, Bok-Hee, 633Ssin, Seungyoub, 661Stap, Cindy, 127Suh, Changjin, 473, 565

Author Index 897

Page 4: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Sung, Yunsick, 597Suresh, Abhijit, 885

TTan, Ian K. T., 875

UUddin, Jia, 153Um, Kyhyun, 597, 661, 731

VVeeraraghavan, Prakash, 11Vu-Van, Hiep, 145

WWang, Jen-Chieh, 337Wang, Jun-Zhe, 49Wang, Xuan, 321Wen, Low Zhi, 875Weon, Il-Yong, 383Whang, Sun-Min, 633Wong, Kok-Seng, 365Woo, Kim Byeung, 707

XXi, Yulong, 731Xu, Xun, 237

YYang, Ching-Nung, 697Yang, Lei, 321Yang, Seung-Hun, 821Yang, Zong-Hua, 49Ye, Xinfeng, 237Yi, Gangman, 305, 785Yoo, SeongMin, 373Yoon, Hyunsoo, 185, 229Yoon, Sangeun, 653Youn, Taek-Young, 347Yu, Heonchang, 483Yun, Han-Kyung, 633

ZZhang, Jie, 357Zhou, Qingguo, 321Zhou, Rui, 321

898 Author Index

Page 5: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Subject Index

A1-hop neighbor nodes, 774, 776, 778, 779, 7802D-3D conversion, 402, 4063.20 Cyber Incident, 5543D face representation, 423. See also Face

representationaverage face model, 426database, 428ICIA algorithm, 427–428samples, 426, 427scans, 424, 425

3-way chaining authentication, 76, 77, 844 9 4 network, 60t5 9 5 network, 59, 61f5 M pixel CMOS Camera, 68864 bit block encryption, 2277 9 7 network, 59–60, 61f8/4 Hamming code, 25802.1aq Shortest Path Bridging, 5669 9 11 network, 59, 61, 62fAbnormal behavior detection, 554, 556

cyber-targeted attack response system,556–557

large-scale data analysis engine, 557–560using MapReduce, 560, 561f

Absolute temperature (AT), 250Accelerator pedal position, 710, 712, 713, 714fAccess control model, 517, 520

access control module, 520applicability, 522, 523tapplication of policy, 522, 523tcomponents of, 521tcontext controller, 521context information, 517–518data transmittance, 520flexible assignment, 522, 523timmediate response, 522, 523tinformation transmittance, 520policy management system, 521

problem analysis, 518–520review process, 522role management system, 521–522user data, 520

Access control techniques, 522Access point (AP), 174, 441, 444, 453, 454,

5073 9 3 access points, 471Wi-Fi access points, 506, 513

Access Points Routers, 444ACI 318 Code 1995, 816–817, 819ACK storm, 2, 6Active Contour Models (ACM), 679Active pixel (AP), 424Active set top box

ActiveSTB, 308MP4 versus H.264 scalable streaming,

307–308scalable multimedia, 309–310scalable stream, 309t, 310tsimulation environment, 309f

Active Shape Model (ASM), 680ActiveSTB, 307, 308

NS-2 simulator, 308Activity Based Access Control (ABAC), 517,

519Ad hoc TCP (ATCP), 6, 7Adaboost and Haar-like algorithm, 384–385,

388Adaboosting, 769, 790tAdaptive media streaming, 306Adaptive navigation system. See Self-Adap-

tive navigation system (SeNS)Adaptive normalized cross correlation

(ANCC), 298–299Adaptive smoothing (AS), 454, 455, 458, 510,

511foriginal noisy signal, 456f

Adaptive streaming scheme, 306

J. J. (Jong Hyuk) Park et al. (eds.), Frontier and Innovation in Future Computingand Communications, Lecture Notes in Electrical Engineering 301,DOI: 10.1007/978-94-017-8798-7, � Springer Science+Business Media Dordrecht 2014

899

Page 6: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Adaptive support weight (ASW), 298Adhesion force, 688, 690, 692, 695Adhesion techniques, 688Ad-hoc routing. See VANET (Vehicular Ad-

hoc Network)Advanced Driver Assistance System (ADAS),

763, 764, 771Advanced emergency braking system (AEBS),

764, 768, 771braking force of, 768tcommand, 769fsafe distance secured by, 770f

AEEC (Airlines Electronic Engineering Com-mittee), 416

AES-256, 225data encryption conversion code, 226f

Affective computing, 338emotion classification, 339, 340temotions, 339fuzzy cognitive mapping, 340Thayer’s emotion model, 339–340

Ahead-of-time (AOT) decompression, 720Air and fuel ration (AFR), 249AIS, 545Alcohol consumption and skin aging, 262,

264–265, 266Alphanumeric passwords, 12Amazon EC2, 483

resource types, 489tAndroid devices, 580Android malware, 577fAndroid Market, 474Android phone, 254Android systems, 314

operating systems, 315Android vaccine, 479–480

in AV-Test, 480tAngular misalignment fault (AMF), 179ANSI/ISA-99 international standard, 536Anymon Plus, 844AODV (Ad hoc On-demand Distance Vector),

773, 774App Store, 133, 474

App for administrative works, 474App verification system of, 478illegal copy prevention system of, 478–479illegal copy prevention technology by, 479tverification items by, 479t

Application layer access control block, 540Application Programming Interface (API),

434, 673App Store, 478–479

data publishers, 448OS kernel, 417pull-based, 547push-based, 547resource information, 579twitpic, 880for Wi-Fi Direct, 444

Application-specific integrated circuits(ASICs), 136

APT (Advanced Persistent Attack), 554, 556,557, 562

Arden syntax, 409Area defuzzification method, 149ARINC 653 Standard, 416

ARINC 653 APEX (Application/Executive), 416–417

core module componentrelationships, 417

ARPA, 545Array control unit (ACU), 142, 195, 196Artificial intelligence (AI), 238, 598, 599, 662

domain, 338Artificial Neural Network (ANN), 634, 635Attitude Heading Reference System (AHRS),

616specification of, 618t

Attraction force generators, 688Audio classification, 393

GA operators’ generation, 397–398GA-based FCM for, 396–397initialization, 397result, 399t

Audio features extraction, 394–396checking termination criterion, 398feature vector configuration, 396features distribution, 395flow root-mean-square ratio, 394spectrum spread, 394zero-crossing rate, 395–396

Audit mechanism, 186delegation of, 188for outsourced data, 188–189

Augmented Reality (AR), 467–468Authentication signal, 38–39Authentication technology. See also Log

authentication systemintroduction to, 590PKI authentication service, 591

AuthentiGraph, 13Auto-configuration, MRA transform, 680–681AutoFACT, 787Automatic annotation processing, 786

900 Subject Index

Page 7: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Automobile detection algorithmfor blind spot detection, 830, 831cascade-type classifier, 826fdata training process, 825image according vehicle distance, 826fpre-processing image classification, 828fusing proposed feature training, 827fshadow area extraction method, 828fverification process, 825–826

Automobile identification algorithm, 822Automotive simulation models (ASMs), 708Autonomous drive path planning, 732Awase-E system, 13Azimuth, 766

CSego transformation by, 767f

BBack propagation (BP), 91, 104, 105

of BN, 90, 92Background subtraction, 162–163, 877

accuracy measurements, 881, 882f, 883fin car park management, limitations, 881example of, 879f

Backoff-free fragment retransmission (BFFR),172–173

energy consumption, 175fenergy efficiency, 174fwith no contention overhead, 174f

Backpacking, 322, 324Backpropagation neural network (BPNN)

model, 140, 340–341, 341fmapping of, 141process, 342

Basal metabolic rate (BMR) estimation, 264Base area, 889Base station, 76Basic routing protocols, 773Basic safety message (BSM), 765Basic stat module, 847Basic Station Set (BSS), 359Bayesian network (BN), 88, 92, 93Bayesian probability-based imitation learning,

600Beacon scheduling, 496–497

completion time, 501–502slot collision avoidance, 497f

Beacon-enabled mode, 495Bearing fault (BF), 179Behavior execution, 661–662

basic task generation, 663–664inoperability of server and 2D camera,

664–666server protocol for task execution, 666–667

Behavior frequency table by status, 600, 601tBehavior-based detection, 576, 577Bellman-Ford (BF) algorithm, 154

connected routers with different linkweights, 156f

CPU/GPU implementation of, 158fdistance vector routing algorithm, 155GPU-based, 156–158parallel implementation of, 158fperformance evaluation, 158–159using CPU, 157fusing GPU, 157f

Big data, 554abnormal behavior detection based on, 556analysis, 844, 851security research using, 555

Bilinear-pairing, 3Biometric authentication, 18, 383, 886Biometric entropy, 886Biometric system, 12Biomimetic approaches, 688Biosignal based interface

comparison with existing pointing inputdevice, 623, 628–630

interface performance evaluation withEMG intensity, 621, 623

movement path, 622fmoving distance, 625fposition manipulation performance of

interface, 620–621position-control performance model, 622frepeated modified model, 622f, 626f

Bi-stable Processor (BP), 88BIT (Biology Information Technology), 22Bit error rates (BERs), 2, 26, 31, 170, 777

in mutated codon sequence, 26fBits-per-pixel (bpp), 705Blast2GO, 787Blind spot, 764, 822

areas, 823f, 830Block-level deduplication, 230Bluetooth, 248, 475, 476t

messages, 444tethering, 741

BMS-WebView-1, 55, 56fBowed shaft fault (BSF), 179Bridge priority masking, 566

cyclic priority matrix, 569–571and priority matrix, 566–568problem definition, 569

Bring-your-own-device (BOYD), 128Broken rotor bar fault (BRF), 179Bucket boundaries, 348Bucket index ordering (BIO) problem, 349

Subject Index 901

Page 8: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Bucket index ordering (BIO) problem (cont.)bucket boundary determination, 352counter measure, 353cyclic query, 354, 354fin existing bucketing schemes, 352–353random query, 353in range query, 350–351

Bucket-based database management tech-niques, 348

Bucket-based index, 348adversarial model, 349bucket construction and data query,

348–349, 351frandom index assignment, 351t

Building recognition method, 505range of search space, 506f

Bytecode compression methods, 720decompression of, 720

CC/C++ language, 759Caroo pro, 248CarSim, 764Cartesian coordinate system, 46, 765, 889Cartesian equation, 890Cat swarm optimization (CSO), 330, 331–333

seeking mode, 331–332tracing mode, 332–333

CA-TRBAC, 519CEB-FIP Model Code 1990, 814–815Central processing unit (CPU)

-based implementation and GPU, 159thardware specification of, 157tover GPU, speedups of, 160f

Centroid of base, 889Challenge-Response protocol, 186Channel bandwidth, 775Chest CT image, lung segmentation of, 679

histogram of, 682fimage segmentation using MRA Level-set,

681fvolume data of, 683, 685

Choregraphe, 662CIE-rg chromaticity space, 120–121, 121fCINDER (Cyber-INsiDER), 555CKAN (Comprehensive Knowledge Archive

Network), 448functional structure of, 449fsemantic web layer cake, 449f

Class meta-model element, 462–463graphical representation of, 463f

Classification model, 887cross product of vectors, 890

shape, rough representation, 892fshifting plane equation, 891three dimensional shapes, 889ttolerance level, 890, 891two dimensional shapes, 888t

Classification, 330, 890emotion classification, 339GA-based FCM for audio classification,

396–397Client and devices, 439, 440f

broadcasting capabilities, 441validator devices, 441

Climbing robots, 687Clinical decision supporting (CDS) system,

409system architecture for, 412in u-health portal, 411

Cloud, 887, 890Cloud Computing (CC), 44, 48, 128, 186, 212,

323, 483, 854cloud customers (CCs), 212cloud data center, 516cloud manufacturing, 238Cloud Provider layer, 213cloud security, 374customer layer, 213implementation and analysis, 218–219problem formulation, 215–218resource reallocation in, 45–46security assessment, 380–381system architecture, 213–215, 214f

Cloud service pricing, 854monopoly provider, 855

Cloud Service Providers (CSPs), 186, 374,375, 381

storage service, 186Cloud services, 322, 323, 374, 854Cloud storage technique, 186, 374

bilinear map, 187cloud service provider (CSP), 231computation cost, 190tcomputation overheads, 233, 234tconstruction, 188–189data uploader, 231deduplication over encrypted data (see

Deduplication over encrypted data)definition, 187–188notation, 190tperformance evaluation, 190–191security analysis, 189–190storage overheads, 233, 234ttag-generation time, 191fupdater, 231verification time, 191t

902 Subject Index

Page 9: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Cloud-based approach, tool selectionautomatic query generation, 241–242implementation, 243–244resource virtualization, 240–241suitable tool, selecting, 242–243tool matching scheme, 239–240

Cluster estimation. See Subtractive clusteringmethod

Cluster formation, 80–81Cluster-head (CH) node, 80Clusters, 81fCMOS 0.35 lm technologies, 290CMOS 65 nm technologies, 290Co-creation, 864

cases, 865tCo-creation platforms

block diagram of, 869fcomponents of, 869tconceptual diagram of, 868fdesign, 864–866functions of, 866, 867tproduct development, 871–873product planning, 870–871sequence diagram, 872f, 873structure and components, 868–870

Coding DNA sequence (CDS) watermarking,22

goals of requirements, 23Coding sequence watermarking, 22Coding tree block (CTB), 272Coding unit (CU), 272Codon numerical mapping, 24fCognitive radio (CR) technology, 145

system model, 146–147Cognitive radio sensor network (CRSN), 146Cohen-Daubechies-Feauveau (CDF) biorthog-

onal wavelets, 25Coincidence Processor (CP), 88Cold chain management, 203

FCQ for (see Floating continuous query(FCQ))

RFID tag application in, 204fsensor tag application in, 204f

Collective services, fabricated data to, 441Collision, 733Color pixel recognition, 162Color segmentation, 119, 163–164Command and Control (C and C) server, 607Command filter, 541Compact index (CI), 58Compute Unified Device Architecture

(CUDA), 154–155C code, main function of, 159f

Computer communication environment, 843

Computer image analysis, 678Computer numerical control (CNC) machine

tools, 241Computer Reservations Systems (CRS), 322Computer vision, 800

-based fire detection, 162problem, 505

Computer-Aided Process Planning (CAPP)systems, 238

Computerized Tomography (CT), 678Congestion avoidance, 5Congestion window (CWND), 3, 8Congestion window limit (CWL), 3, 8Constant bit rate (CBR), 174Constructive sparse positive realization

method, 98–100, 101Content providers (CPs), 587Contention Aware Scheduling (CAS) algo-

rithm, 216Contention free period (CFP), 496Context information, 517–518

aggregator, 518interpreter, 518widget, 518

Context-aware control service, 834–835abnormal status inference, 841fcollecting and categorizing information,

837–838context deduction, 835context modeling, 835control service process, 839, 840fcontrol target, 838tcrop information, 837tinference rule, 840ontology model for, 838fstructure of, 835–837system components, 836tvertical farm environment, 836f

Context-aware GUI based logistics service,670

Continuous active mode (CAM), 170Continuous query, 203, 204

processing performance, 208Control systems, 88, 96, 222, 225, 536, 537

blocking unauthorizedaccess to, 540, 541

categorization of network attacks against,538f

Control theory, 119Conventional hardware routers, 154Converged network adapter (CNA), 131Cooperative safety system, 764Co-privacy, 367Coprocessor, 95

Subject Index 903

Page 10: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Correlation analysis, 554, 555, 556, 558, 560,844

CPU branch target buffers (BTBs), 721Crack width calculation program, 817fCrack width formulation, 814

ACI 318 Code 1995, 816–817calculation, comparison of, 818fCEB-FIP Model Code 1990, 814–815Eurocode 2, 816structural performance verification of

JSCE, 816CRAE (Co-Relational Analysis Engine),

557–558Crisp rules, 104, 108CSA (Cloud Security Alliance), 374CSMA/CD protocol, 358CSO-SVM, 330CU splitting termination (CST), 272–274, 278Cued-recall based technique, 13Current time stamp-based travel time, 748tCustomer relationship management (CRM),

127Cutting tools ontology, 238, 239, 241, 244Cyber genome programs, 555Cyber security, 87Cyber security evaluation index (CSEI), 89Cyber security risk model, 88

for power plant RPS, 91fCyber threats, 528

Application Protocol attacks, 529, 530tflow authentication, 532–533flow whitelist, 533fIP packet filtering, 529–530network intrusion detection, 530network protocol attacks, 528, 529tsystem authentication, 531, 532f

Cyber-attacks, 526, 537in SCADA networks, 528, 531, 534

Cyber-targeted attack, 554response system, 556–557structure of, 557f

DDalvik Machine, 584Data anonymization, 366Data collection, 365Data editing module, 847Data hiding, 697

512 9 512 grayscale cover images, 704fissues with, 697–698matrix encoding, 698

Data import module, 847Data integrity, 186, 191

Data mining techniques, 606, 607Data sharing, 447–448

and LOD module, 451fmodule definition, 450platform architecture, 450, 451fplatform design, 449

Data transfer module, 124Database management system (DBMS), 347Daubechies 4-tap filter, 165DC coefficient, 39DC motor, 692DCF inter frame space (DIFS), 171DCT coefficient, 38DE2-70 board, 124, 125Decentralized workflow scheduling systems,

485Decoder, block diagram of, 40fDecoding procedure, 703Deduplication over encrypted data, 231–233

audit of outsourced data, 232–233initial upload, 231–232, 232fretrieval of outsourced data, 233subsequent upload, 232system setup, 231update of outsourced data, 232

Deduplication technique, 230bilinear Diffie-Hellman (BDH) assumption,

230bilinear map, 230

Deep packet inspection (DPI), 537Default access control filter, 542fDefault filter, 540Delay time in routing process, 783, 783tDenial of Service (DoS) attack, 89Denoising scheme, 148–150Depth-image-based rendering (DIBR), 401,

402Description logic (DL) queries, 241, 242

generation procedure, 242Detect accident (DA), 250Deterministic and Synchronous Multi-channel

Extension (DSME), 496–497enhanced DSME design, 499–500, 501f,

502ffirst experiment, 498–499revised algorithm, validity of, 501–5022nd revision, 500

DIBR video watermarking, 402embedding, 402fidelity test, 405robustness test, 406spatial embedding, 403–404, 403ftemporal embedding, 404visual quality results, 406t

904 Subject Index

Page 11: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

watermark extraction, 405Digital forensic

investigation procedure, 645fof SNS real time data, 644

Digital like design concept, 290Digital optical processor, 96Digital rights management (DRM), 37

three SD videos from, 41fDigital signal processors (DSPs), 136Digital video frame obfuscation method,

39–41decoder, 40fencoder, 40fhuman visual system, spatial frequency

response of, 40fSD videos, 41f

Dijkstra algorithm, 325Direct attached storage (DAS), 128Directed Acyclic Graph (DAG), 215, 484, 787

sample, 216fDiscontinuity preserving smoothing (DPS),

454, 510average error in localization, 512fIDW-interpolated map, 511and path loss model, 455freconstructed radio map, 511Voronoi-interpolated map, 511

Discrete Cosine Transform (DCT), 638Discrete phase-type (DPH) distribution, 99,

100Discrete-state discrete-time Markov chain, 99Discretionary access control (DAC) scheme,

517, 519, 523tDistance evaluation technique (DET), 180,

181, 182Distributed coordination function (DCF), 171,

173Distributed Data Centers (DDCs), 378, 379,

380Distribution function module, 848DNA copyright protection, 22, 23DNA crypt algorithm, 22, 25DNA cryptography, 22DNA sequence watermarking, 23–25DNA steganography, 22DNA Watermarking, 22DNP3, 526, 530, 536, 537, 544DO-178B certification, 416DOM parser, 546, 548, 549Domain Name System (DNS), 605

cache, 607Korea National DNS, 607, 608flog analysis, 609, 611, 612logs, 606, 607, 608, 610, 612

query, 606servers, 606, 612

Domestic Android App Stores, 478Domestic simple security management, 844DOM-parser-based EtriIVEF library, 546DoS (Denial-of-Service) attack, 89, 528, 529t,

537Drag gestures, 733, 734f, 735, 736fDraw Sequential Direction (DSD), 468

direction cognition of, 469fdiverse locking systems, 469t

Draw-A-Secret technique, 13Drivetrain, 711f, 716Driving behavior, 248, 252DRLES speed function, 684DRSLE-based method, 680DSDV (Destination-Sequenced Distance-Vec-

tor), 775dSPACE, 708DSR (Dynamic Source Routing), 773, 774,

775Duqu, 536DWT (discrete wave transform)

-based watermarking, 22coefficients, 22, 23, 24, 26on multi-core architecture, 141f

Dynamic analysis, 576, 844-based detection, 577using CarSim, 764

Dynamic datacenter, 128Dynamic neural fields (DNF), 598Dynamic random topology, 6–7Dynamic time warping (DTW), 262

extrinsic aging factors and skin texture age,268f

in measuring skin aging, 262, 266–267

EE2BOX’s EBIMU-9DOFV2 product, 617Eagle mGuard, 537Earliest Finish Time (EFT), 217, 218Earliest Start Time (EST), 217Early fire detection, 161Early warning systems, 66, 70–72, 72fECDIS, 545Eco-driving, 248, 252, 740Edge movement, 694f. See also RobotsEEPR algorithm, 778

advanced, 778–779examples, 779f, 780fperformance metrics, 782–783simulation setup, 781–782

Eigenfaces, 388, 389, 390f

Subject Index 905

Page 12: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Electronic Stability Program (ESP), 710E-mail, 468Embedded image processing, 691–692EMG sensor, 618

abductor digiti minimi, 619fgraphic input using, 621fand quasitension, 619f, 627f

EMG-based interface, 616Emotion classification, 339, 340tEmotions, 339Empirical mode decomposition (EMD), 178,

698e-Navigation, 545Encapsulation, 588–589Encryption application model, 222Encryption key, 374, 377, 378, 379, 380, 381,

382key management, 375, 376

Energy detection, 146Energy-efficient Probabilistic Routing (EEPR),

775, 784advanced algorithm, 778–781algorithm (see EEPR algorithm)metrics in, 776–777packet forwarding process, 776simulation, 781–783

Energy-Enterprise Security Management (E-ESM), 222, 223f

Engine volume efficiency (Engine VE), 249Enterprise class solution, 128Enterprise computing, 127–129

App store challenges, 133–134components of, 129converged infrastructure, 128, 130, 131,

134deployment, 128, 131, 133, 134enterprise architecture, 129fEthernet speed, 132fexternal storage trends, 132–133memory trend, 130fmultiple roles/processes, 134network trends, 133resources allocation challenges, 133, 134RFS count, 132fsegregated networking, 128, 131server trends, 129–132SSD capacity, 131, 132f

Enterprise security management (ESM),222–223, 844

Enterprises’ information systems, 864Entity-relationship (E-R) diagram, 656, 658fEntriVEF Pull Parser, 546Entropy, 179, 181, 182, 316, 680, 886

coding, 272

password entropy, 19Environment control, 834Environmental pollution and skin aging, 262EON guideline, 409Equal-cost multi-path (ECMP) technology,

565, 566Equal-cost multi-tree (ECMT), 566Erbium-doped fiber amplifiers (EDFAs), 97Error compensation, 802f, 804, 807

gaze data processing, 805fgaze time and monitoring, 806f

Error detection, 390, 822Esper/Storm, 557Ethernet, 128, 131, 536, 692

and ECMP, 566routing, 566speed, 132f

e-Tourism, 323ETX (Expected Transmission Count) metric,

775, 776–777forwarding probability via, 779f

Euclidean distance, 46, 105, 454, 508, 886Euler angle, 616, 617Eurocode 2, 814, 816Event mechanism model, 734fEvil Twrin, 222Exclusive region (ER), 30

-based coverage of receiver, 32f-based scheduling, 31–32scheduling scheme, 30

Explicit Congestion Notification (ECN), 3, 4Exploiting the modification direction (EMD),

698EXPRESS-based data models, 239

EXPRESS standard, shortcomings, 240Extended inter frame space (EIFS), 171Extension name, 464Extracellular matrix (ECM), 262Extrinsic (external) aging factors, 262Eye tracking, 801, 804, 807

errors, 808

FFace labeling algorithm (FLA)

candidate face region, 386continuous labeling between frames,

386–387labeling accuracy, 389–390, 390fprocedure, 387–388results, 389f, 389t

Face region detection and face learningAdaboost and Haar-Like Algorithm,

384–385

906 Subject Index

Page 13: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

linear discriminant analysis (LDA), 385local binary pattern histogram (LBPH),

385, 388principle component analysis (PCA), 385

Face representation, 423, 424eigenspace, 427eigenvalue, 427eigenvectors, 427ICIA algorithm, 427–428and Max Planck Institute (MPI) results,

428toptical and SIFT flow, comparison, 425f,

425tshape information, 426texture correspondence, 424vertices correspondence and model gener-

ation, 424–427Facial animation, 634Fast Fourier transform

algorithm, 636analysis, for sentence, 639f

Fast PU decision method, 272, 274–276block motion complexity (BMC), 274and HM reference software 10.0, 276trate-distortion (RD) curves, 277fweight factor for, 275f

Fault classification, of induction motor, 177,178

data acquisition, 178–179data conversion, 179feature extraction, by GLCM, 179–180using SVR, 180–181

Fault signatures, 181, 182fFFriction, 690FGravity, 690Fiber-optic signal processors, 97, 98, 100Fiber-optical signal coprocessors, 96Fibre Channel, 128File-level deduplication, 230Fingerprint Wi-Fi Radio Map, 453–454

average localization error, 458finterpolation, 454–455map resolution with RSS, 456–457

Fire detection algorithm, 139–140color segmentation, 140ffour-stage algorithm, 140fmoving regions detection, 140f2-level discrete wavelet transform, 141f

Fire detection method, 135background subtraction, 162–163classification, 165–166color segmentation, 163–164, 164f

color variations using spatial waveletanalysis, 164–165

false negatives (FN), 166MATLAB 2012b, 166percentage of FN (PTN), 166percentage of TP (PTP), 166true positives (TP), 166vision based, 136

Fire wall, 536Fire-containing movies, normalized wavelet

energies with, 165fFirewall logs, 844, 851Fisherfaces, 388, 389t, 390fFitt’s law, 616, 620, 622fFixations, 803Flame, 536Floating continuous query (FCQ), 205–206,

209decomposition, 206–207performance evaluation, 207–208processing flow, 207f

Flow filter, 541Flow whitelist, 531, 533fForce intensity, performance intensity, 624,

626–628Ford-Fulkerson Algorithm (FFA), 745Foreign-made log analysis, 844Formants frequency, 633, 636, 638, 639, 640FPGA, 120, 124, 125Fragment retransmission, 172–173FTraction, 690Fuel efficiency model, 248

system flow diagram, 248–251, 249fFuel gauge level, 251fFunctional annotation, 786

data features, 787, 789fnon-binary form, 788Saccharomyces cerevisiae, 787, 788

Functional gene annotation, 786Fuzzy c-means, 194, 394Fuzzy cognitive map (FCM), 338, 340, 341f

detecting emotion colors, 342fFuzzy interference rule, 148Fuzzy logic, 44, 46Fuzzy matching method, 635Fuzzy neural networks (FNNs), 104Fuzzy relation equation-based approach, 111Fuzzy system

for spectrum sensing (see Spectrum sens-ing, fuzzy for)

system model, 146for wavelet denoising, 150

Subject Index 907

Page 14: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Fuzzy variable, 47fFuzzy-based resource reallocation scheduling

model (FRRSM), 44architecture of, 46frule bases, 47t

Fvacuum, 690

GGA-HNN3, 59Gamma value correction, 298Gateway authentication, 81f, 82Gaussian distributed random variable, 747Gaussian noise, 31Gaussian random variable, 146Gaze behavior analysis system, 800, 801

basic gaze data and monitoring results,805, 806f, 807

data compression patterns, 807, 807fexperiment environment, 804–805gaze time and monitoring, 806f, 807object centered (see Object centered gaze

behavior analysis system)object-based gaze behaviors, 808

Gaze data processing process, 804Gaze duration, 803GBSR (Greedy Border Superiority Routing),

752, 753, 754f, 755Gender and skin aging, 262Gene annotation, 786Gene expression, 786Gene ontology (GO), 786, 787, 788, 795–796

dataset reconfiguration, 790error rate applying several methods, 793ferror rate for each term, 794tnegative, 791, 792tpositive, 791, 792t

Generalized reactivity (GR1) formula, 431,432

importance of 433overall processes, 434f

General-purpose microprocessors (GPPs), 136Generic-based back propagation neural net-

work (GBPNN), 136Genetic algorithms (GAs), 329

crossover, 397mutation, 397–398selection, 397

Geometrix FaceVision 200, 429Georeferenced class, 463f

with temporality, 463fGeo-spatial intelligence systems, 71

Gestures, 732drag gesture experiment, 736fkinds of, 734fpoint gesture experiment, 735fpseudo code for movement, 734frecognition, 731recognition rate analysis, 737tscissors gesture experiment, 736fslide gesture experiment, 736f

GLIF, 409Global Distribution System (GDS), 322Global Positioning System (GPS), 248, 441,

506, 516, 673, 674, 675, 765-based location information, 671-based position recognition technology,

670for car parking information, 877signaling channel, 440, 453in traffic information, 741, 744

GMDSS, 545GNSS application, 465, 466GNU R, 844, 851GOA (gene ontology annotation), 787Google Android’s Dalvik VM, 720Google glass, 212, 213GOP structure, 38Gotcha, 787GPSR (Greedy Perimeter Stateless Routing)

protocol, 752, 753greedy forwarding, 753local maximum processing, 753

Graphical Models, 835Graphical-based password techniques, 12Graphics processing units (GPUs), 154, 194

-based Bellman-Ford (BF) algorithm,156–158

-based software paradigm, 154and equivalent CPU-based implementation,

159thardware specification of, 157tmulti-threading arrangement on, 155fover CPU, speedups of, 160f

Gray level co-occurrence matrix (GLCM),179–180

sensitivities of, 182fGreedy forwarding, 753, 754fGreenhouse cultivating environment, 834Group of video coding experts

(VCEG), 271GUI-based situation information processing

technology, 670GUIDE, 409

908 Subject Index

Page 15: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

GZTR (Geographical Zone Based Two-tierRouting) algorithm, 755

average hop counts, 760tnext zone selection algorithm, 755–757packet loss rate, 760frelay node selection algorithm, 757–758throughput rate, 759f

HH.264 Scalable Streaming, 310, 311Haar-like feature, 825, 826fHaar-Waveletes, 823Habitat monitoring, 76Hadoop Distributed File System (HDFS), 606Hadoop file system (HDFS: Hadoop Distrib-

uted File System), 556Hadoop platform, 560Hamming + 1 scheme, 700

and Hamming + 3 scheme, 705tand matrix encoding, 705t

Hamming + 3 scheme, 700, 701and Hamming + 1 scheme, 705tand matrix encoding, 705t

Hamming codes, 698–699binary Hamming codes, 6991-error correcting codes, 701

Hand gestures, 616Hard c-means (HCM) clustering, 104, 105,

106, 108Hard disk device (HDD) capacity, 131Hard scatter partition, 112, 117

of LBG algorithm, 116fHard threshold function, 147Hardware-software co-design scheme, 120,

125Harris-Benedict equation, 264HBAE (Host-Based Analysis Engine), 557Henagon shape, 888tHeptagon shape, 888tHexagon shape, 888tHidden Markov model (HMM), 598

ED decision and, 509ftracking, 508, 513tracking errors by, 510f

Hidden pilot sequence, 30Hierarchical task network (HTN), 663High efficiency video coding (HEVC), 271High performance cluster computing (HPCC),

128HIGh security and light weigHT (HIGHT),

227High utility sequential (HUS)

HUS-Span, 55

HUS-Span algorithm, 50pattern mining, 49

High-performance TI DSP, 136High-resolution digital images, 678HMIs (Human Machine Interfaces), 526, 536Homomorphic encryption scheme, 366

algorithm, 368–369performance, 370fpreliminary definitions, 367

Host Discovery, 528, 529tHost-based detection, 577Hounsfield Unit (HU) histogram distribution,

682Huffman coding, 721Huffman decoding, 720Huffman-encoded bytecode, JIT-decompres-

sion of, 720HUINS SoC Master 3 board, 138, 139fHuman visual system (HSV), 39

spatial frequency response of, 40fHuman-computer interaction (HCI), 801Hybrid deduplication scheme, 230Hybrid electric vehicles (HEVs), 708Hybrid method, pixel value’s transition

adoption of curve fitting, 300–301, 301fgetting transition state, 299–300, 300f

Hypo-monocyclic-Coxianrepresentation, 100

II/F filter, 540I2Core System Management Application, 70IaaS, 860IBM data generator, 55, 56fIBM QRader, 555IBS/INS, 545ICCP, 536I-Concatenation operation, 51, 53Iconic stereotypes, 462–463

stereotype set class and, 465fIDC (Internet Data Center), 516Idle, stop, and start (ISS) function, 708IEA, 787IEEE 802.11 MAC, 170

backoff-free fragment retransmissionfragmentation, 172–173

classical fragmentation (CF) scheme, 172classical fragmentation contention

overhead, 172fclassical fragmentation overheads, 172ffragmentation in, 171performance evaluation, 173–175

IEEE 802.11 station (STA), 170

Subject Index 909

Page 16: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

IEEE 802.11 wireless local area networks(WLANs), 169

IEEE802.15.4, 495IEEE802.15.4 task group (TG4e), 496IEEE802.15.4e DSME, 496–497

performance evaluations, 497–498topology, 499f

If-then rules, 104Illumination effects, in stereo images, 302f,

303, 303fIMA (Integrated Modular Avionics)

architecture, 415Image content, 799

information detection, 800Image data-per-processing element (IDPE)

variation, 194, 200Image object representation method, 800–801Image processing

hardware tools, 878, 879timage capturing, 878image detection, 880integrated car park management system,

876–877pre-processing, 878–880, 879fsoftware tools, 878, 879ttwit status, 880twitpic image, 880

Image segmentation, 678, 680, 684, 685, 877using Level-set, 679–680, 681f

Image-based automobile detection, 822Implicit Password Authentication System

(IPAS)advantages, 13–14domains, 14experiment, 15–16sample image with implicit objects, 16fsecurity of, 19survey analysis, 17–18survey questions, 16–17usability of, 18–19user test phase, 15

Inactive pixel (IP), 424Incoherent domain, 98Independent component analysis (ICA), 598Induction motor, 177

fault classification of, 178–179IndusCAP-Gate (Industrial Cyber Attack

Prevention Gate) system, 536application, 539farchitecture, 539fprototype platform, 543f

Industrial firewall, design ofarchitecture and application of IndusCAP-

Gate system, 538, 540

implementation and evaluation, 543multiple access control filter based

blocking of unauthorized access,540–543

Information Integration Core (I2Core), 67, 68basic data flow, 71fbenefits of, 73early warning systems, 70–72, 72fearthquake sensor, 73execution concept, 70features, 68, 69fhuman interaction, 71sample execution, 70–73

Information integration, 324Information systems

consumer systems, 68tdata sources, 67t

Information systems integration, 66. See alsoInformation Integration Core (I2Core)

standalone system, problems of, 66–67Information technology (IT), 279Initial contour, 684Initiative service, 324Integrated car park management system, 875

denoise, 880fhardware tools, 878, 879timage processing techniques, 876–877implementation, 878–881limitations, 881low financial entry point, 876pre-prepared mask, 880fsocial media for communication channel,

877software tools, 878, 879t

Integrated log analysis, 847–848design of, 845–846system, 845, 845f

Integrated starter-alternator (ISA), 708Intel Xeon cache, 130fIntel Xeon cores, 130fIntelligent driver assistance system. See

Advanced Driver Assistance System(ADAS)

Intelligent logistics, 675Intelligent robots, 687Intelligent transportation system (ITS), 764INTER mode, 272Interconnect technology, 131Interface and Test Processor (ITP), 88Interior permanent magnet synchronous motor

(IPMSM), 709controller, 710f

International Association of LighthouseAuthorities (IALA), 545

910 Subject Index

Page 17: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Internet data centers (IDCs), 222Internet navigation, 467Internet protocol routing, 154Interoperability standards, 66InterPro (IPR), 786

correlation coefficient among, 793toriginal, 793tweighted IPR, 792, 793t, 794–795

Interpro2go, 787InterProScan, 786Inter-streaming multiprocessors (Inter-SMs),

194Inter-system VTS Exchange Format (IVEF)

protocol, 545INTRA mode, 272Intrinsic (internal) aging factors, 262Intrusion Detection System (IDS), 222, 223,

530Intrusion Prevention System (IPS), 222, 223Inverse Compositional Image Alignment

(ICIA), 427–428Inverse distance weighting (IDW) interpola-

tion, 454, 457Inverse DWT (IDWT), 22, 25IP/MPLS networks, 565I-phone, 254ISO 14649 (STEP-NC), 241, 243ISO26262, 716ISS, 787IT firewall technology, 537IT logistics convergence. See Smart logistics

serviceIVEF (Inter-VTS Exchange Format) Service,

546iWatch, 212IxBD (Interface-BigData) interface, 558IxLBVA (Interface-LB to VA) interface, 558

JJapan Society of Civil Engineering (JSCE),

816, 819PBD, 816, 819structural performance verification of, 816

Java VM (JVM), 720Joint Collaborative Team on Video Coding

(JCT-VC) group, 271Joint substream video model (JSVM) codecs,

309Junk DNA, 22Just in time (JIT)

decoder, 720, 721

decompression, 720Huffman decoding, 720, 722, 728operation model, 128

Kk-anonymity, 366, 367Key escrow, 588Key management methodology

comparison of, 589encapsulation, 588–589key escrow, 588trusted third party (TTP), 589

Keyboard dynamics, 886Keystroke dynamics, 886Key-Value Models, 835KINECT camera, 254, 255, 257, 258Kinect, 616, 732Knowledge encoding method

knowledge authoring method, 411–412in u-health portal, 410, 411–412

Knowledge-based identification, 314Korea Internet & Security Agency (KISA),

606Korea national DNS, 606

deployment status of, 608fstructure of, 607

Korean diphthongs, 637tKorean single vowel

lip shape and tongue’s location of, 638fsingle vowel triangle, 637f

Korean vocal sound system, 634characteristics of, 637vowel vocal sound system, 637

LLagrange multipliers, 180Laplace transform, 99Large-scale data analysis engine, 557–558

feature description, 560ffunctions of, 559tmajor host-based features, 559tstructure of, 558f

Layered streaming scheme, 306LBAE (Large-scale Batch Analysis Engine),

557Leap, 733Level-set, 678

segmentation for body detection, 681fspeed function, 679

Lifting based integer DWT transform, 23

Subject Index 911

Page 18: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Likiwid Performance tools, 726Limit state design, 814, 819Linde-Buzo-Gray (LBG) algorithm, 112

hard partitioned spaces, 116finput-output spaces, 116fmodel outputs, 116fnonlinear process, 113, 114, 117rule generation, 112, 113, 114

Linear inference, 113Linear Predictive Coding (LPC) algorithm,

634Linear regression module, 848Linear temporal logic (LTL), 431, 432

decentralized setting, 433fdecentralized specifications, 432–433

Linguistic modeling, 111Linux background, 444Linux kernel, 579Lip sync solution, 635

block diagram of, 636fin digital contents, 640

Local binary pattern histogram (LBPH), 385,388

Local maximum processing, 753, 754fLocal memory, 195Local overlapping bucket (LOB) scheme, 352Localized Big Data Analysis (LBDA), 606,

608advantage of, 609for big data, 613C&C domain, 611Hadoop installation, 609Map/Reduce of, 611

Location area management, 57Location area planning, 58

solution representation, 59Location Areas (LA), 58Location authentication, 440–441Location mechanism, 442

basic scheme, 442registration phase, 442–443secure scheme, 442supported technology, 443–444

Locationsarea-based coupons, 440–441reliable detection of, 441with no signals, 441

Locking system for security improvement(LSSI), 468

D-manager, 470DB-manager, 470design system of, 468, 470, 469f

DSD, 468IDP-manager, 470implementation of, 470–471initial execution screen, 470finput time, 471fL-service, 470performance evaluation, 471screen upon receiving 10 directions, 471f

Locking system. See Locking system forsecurity improvement (LSSI)

LOD (Linked Open Data), 448life cycle and tools, 450fLOD2, 448

Log authentication systemauthentication processing, 594, 595fdesign of, 592–593OSP system environment, 591role of, 593signature authentication, 595fsystem configuration, 593–594X.509 institutional authentication format,

592fX.509 user authentication format, 592f

Log-chromacity color, normalization of, 298Logic Based Models, 835Look-up tables (LUTs), 142Low density radio map, interpolation of,

510–511Low rate wireless personal communications

(LR-WPAN), 495Low-Cost Airline Service System, 324

booking services, 326computing engine, 325–326real-time information transformation, 325task manager, 325web services, 325

Low-cost airlines (LCA), 322Low-cost carrier (LCC), 322LQS-Tree, 51

and Utility Matrix, 52fLRIT, 545LSAE (Legacy Security event Analysis

Engine), 557Lung segmentation

distribution of variance and area, 683fexperimental results, 685timage segmentation using Level set, 679image segmentation using MRA Level set,

681fMRA Level-set method using auto-config-

uration of the initial contour, 680–684,685f

912 Subject Index

Page 19: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

MMAC layer collisions, 4MAC protocol data units (MPDU), 171MAC service data unit (MSDU), 171Machine learning algorithms, 576, 578, 584Machining, 238Macro modeling, 293–295

for TVC circuit, 294ffor VTC circuit, 294f

Magnetic devices, 688Magnetic Resonance Imaging (MRI), 678Maintenance and Test Processor (MTP), 88Malware detection

collection of resource information, 578features for, 579tresource feature for, 579resource information monitoring agent,

580–581, 581fMamdani method, 46Manchester OWL syntax, 242Mandatory Access Control (MAC), 517, 518Mandatory Key Fragment, 378MANET (Mobile Ad-Hoc Network) environ-

ment, 773Many-core architecture, 194, 197, 198MapReduce, 557

abnormal behavior detection method using,560

handling process, 561fSINBAPT, platform specification, 561f

Markers, 254game ‘‘Beyond: two souls’’, 255f

Markup Scheme Models, 835Mass air flow (MAF), 249MATLAB, 764

-based third-party program, 708Matrix encoding, 698

and Hamming + 1 scheme, 705tand Hamming + 3 scheme, 705t

Matrix metalloproteinases (MMPs), 262Matrix module, 848Maximum accessed domain SQL query, 606MB-OFDM UWB systems, 30

network throughput performance, 33f, 34fsimulation parameters, 33tsystem model, 30–31

MCR (Main Control Room), 89MCSO-SVM, 333

classifiers, 333and CSO-SVM, 335tevaluating fitness, 333–334mutation operation, 333solution set design, 333

Mean-variance based method, 680

Medical imaging equipment, 678Medium access control (MAC), 170Mel-frequency cepstral coefficients (MFCC),

393, 634, 635Memory, 131Merkle tree, 230, 234Message authentication code (MAC), 77Message-Locked encryption, 230MiBench embedded benchmark suite, 720Microsoft Foundation Classes (MFC), 662Mile per Gallon (MPG), 248–249Min-Cut Max-Flow Theory, 745MITM, 222Mixture of Motor Primitives (MoMP), 662Mobile administrative services, 474–475

blacklist function, 475whitelist function, 475

Mobile application interface, 324fMobile based pre-order system, 654Mobile cloud computing (MCC), 212Mobile device (MD), 453, 507

ED decision and HMM tracking, 509fmoving device, tracking of, 508moving path of, 509fsimulation results, 508–509tracking errors by EUD, 510ftracking errors by HMM, 510ftracking on real RSS measurements, 509

Mobile device management (MDM), 475,480–481

App management functions of, 481tcomponents of, 477tconfiguration diagram of, 477ffunctional evaluation, 477–478

Mobile internet, 322Mobile malicious code, 475

types of, 476tMobile malware detection trend, 576–577Mobile system

database, 656database design, 656–658server, 656socket programming, 656

Mobile telephony, 96Mobility E-EMS, 224–225

implemented control system, 226fModbus, 526, 536 537

command whitelist, 531, 533fcommands verification, 533DPI Firewall, 537protocol, 526, 528TCP/IP ADU, 527f

Model report module, 848Model-based design (MBD), 708

Subject Index 913

Page 20: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Modified cat swarm optimization method(MCSO), 333

Modified quadratic inference, 113Moment fuel efficiency value, 248Mono-cyclic coxian representation, 100Monoscopic motion mask (MMM), 404Moore’s law, 130, 131Motion activities

motion vector (MV), 273prediction modes, 273t

Motion capture, 254Motion detection, 162Motion recognition, 254, 258Motion sensor. See Attitude Heading Refer-

ence System (AHRS)Motion vector, 38Motion vectors merging (MVM) method, 272Motor-starter-generator (MSG) technology,

708Movement vector, 39Movement-containing region detection

(MCRD), 162–163MCRD, example, 163f

MP4 Scalable Streaming, 310, 311MPEG encoder scheme, 39MPEG-7, 800M-sequence, 38–39Multiband orthogonal frequency division

multiplexing (MB-OFDM), 29Multi-channel EMG, 616Multi-core architecture, 136, 138, 142

discrete wavelet transform on, 141fmoving regions detection, 140freference multi-core architecture, 137, 138synthesis results, 143tsystem parameter, 139tand TI C6146 processor, 143t

Multimedia content management, 393, 399.See also Audio classification; Audiofeatures extraction

Multimodal face recognition. See Facerepresentation

Multi-modal user interfaces, 254–255‘‘Put-That-There’’ controlled systems, 254

Multiple automata, 432Multiple Criteria Decision Making technique,

242Multiple face tracking. See Face labeling

algorithm (FLA)Multiple-access control filter, 542f

processing and policy of, 541fMultiply-accumulator unit (MACC), 196Multi-Resolution Analysis (MRA) Level-set,

678

lung segmentation method using auto-configuration of the social contour,680–684

Mutated codon sequences, BERs of extractedwatermarks in, 26f

MySQL, 557

NNao robot, 662Natural aging process, 262

support vector machine (SVM), 262Natural user eXperience (NUX), 598Natural user interface (NUI), 598, 731Navigation systems, 740NBAE (Network-Based Analysis Engine), 557Nehalem architecture, 722Network allocation vectors (NAV), 171Network attached storage (NAS), 128Network congestion, 3Network games, 468Network interface card (NIC), 540Network layer access control block, 540Network lifetime, 782Network throughput

high transmission power, 362, 363flow transmission power, 362, 363fin interference-free environment, 359–360in signal interference, 360–361

Neural networks, 119New Reno protocol, 2Next Generation Sequencing (NGS), 786Next zone selection, 756f

destination zone, 758ftransmission range, 756f, 758f

Nicotine consumption and skin aging, 262Node energy, 775Non-coding DNA sequence (nCDS), 22Non-fire-containing movies, normalized

wavelet energies with, 165fNon-fuzzy inference systems

consequence identification, 113–114performance evaluation, 114, 115tpremise identification, 112–113

Non-fuzzy neural networks (NFNNs), 104learning algorithm, 105local spaces of, 106, 107foptimization, 106–108, 108fperformance index, 106–107, 107tstructure of, 104–105, 105f

Non-overlapping 7-pixel blocks, 702Nonvolatile memory express (NVMe), 131Normal (NO) fault, 179NoSQL, 557

914 Subject Index

Page 21: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

NP-hard problem, 58NUI/NUX framework, 255

hand gesture, 258fhand mouse framework, 256fhand mouse gesture recognition, 255, 257mapping to monitor, 258fmouse area comparison, 257fsystem architecture, 256f

NUI/NUX-based gaming, 598

OOBD car doctor pro, 248OBDdroid scan pro, 248Object centered gaze behavior analysis system

content object representation structure,802–803

gaze data analysis model in real time,803–804

system model structure, 801–802, 802fObject detection, 688, 692, 695

image processing for, 693f, 694fObject Oriented Models, 835OKF (Open Knowledge Foundation), 448On-board diagnostic II (OBD II), 248

parameters, 249tOn-demand instances, 483–484‘‘One computer has one function’’ concept,

415One-dimensional (1D) vibration signals, 178One-time password (OTP), 76One-way hash function, 76, 77, 78, 83Online server development for robot control

interoperability of server, 664–666server protocol for task execution, 666–667task generation, 663–664

Online service providers (OSPs), 587architecture system of, 593f

OntoBLAST, 787Ontologies, 239, 241

model for automatic growth environmentcontrol of crops, 838–839

service based on, 835Open Source Computer Vision Library (Op-

enCV), 662Open Source software, 878OpenCV image processing, 876, 879tOpFake, 584Optical combiners, 97Optical computing, 95Optical digital filter, 96, 101Optical fiber, 96, 98, 101Optical networks, 96, 97Optical processor, 97f

Optical splitters, 97Optimization problems, 330Optional fabric for backup, 128Optional Key Fragments, 378Original continuous query (OCQ), 203

transformation, 205fOutlier analysis module, 848Out-of-bid event, 484Over the Air (OTA) technology, 475OWL technology, 323OWL-DL ontology, 239, 240

PPaaS, 860Packet collection and control block, 538Packet losses, 2Packet Sniffing, 222Pairing Based Cryptography (PBC) library,

190PAMS (Post-Accident Monitoring System), 89Pan coordinator (PC), 495Parabolic-rectangular (p-r) stress-strain curve,

810, 812f, 817Parallel computing, 154Parallel misalignment fault (PMF), 179Parameter estimating module, 848Parameter select module, 848Parent process ID (PPID), 647Particle swarm optimization (PSO), 104, 106,

329Passdoodle system, 13Passfaces system, 13Passwords (locking system), 468Path modification, gesture definition for,

733–734Path planning, 732

with human intervention, 732Patterns (locking system), 468Pay-per-use pricing, 854, 855, 857–858PDA-based logistics/delivery computer sys-

tem, 671PDU-DB Server, 225Peak signal to noise ratio (PSNR), 41, 42,

276t, 277, 405, 703, 705numerical values comparison, 303f, 304

Pellet reasoned, 243Pentagon shape, 888tPentagonal bipyramid, 889tPER (Packet Error Rate), 777Personal cloud, 374Pfam, 787Photo-detector, 97Photonic computing, 95

Subject Index 915

Page 22: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Photonic devices, 96Photonic filters, 97Pig code, 610, 611fPINs (locking system), 468Pipelined microprocessors, 721PIR SuperFamily, 787Pixel-to-vertex map (PVM), 424, 428PKI-based authentication sub-system, 588PLC (Programmable Logic Controller), 89,

526, 537Plot module, 848Poisson distribution, 218Poisson process, 31Policy and alert management block, 540Polygon-based object annotation method, 800Position-control performance model, 622f,

623–624Positive realization, 96, 98–100Positive system, 98, 99, 101Positron Emission Tomography (PET), 678Potential high utility sequence (PHUS), 50Prediction unit (PU), 272Prediction-based travel time, 748tPre-order service, 655PreScan, 764Price history, 484Pricing schemes, 854, 855, 859, 860Principal component analysis (PCA), 598Prints, 787Priority matrix (PS), 566–567, 567t

bridge Id/path Id, 568tcyclic priority matrices, 569–571fairness evaluation, 571–572with 4-bit priority words, 568tproblem definition, 569

Privacy-preserving data collectionalgorithm, 368–369performance, 370fpreliminary definitions, 367

Private LAN, 128Probability Based Improved Broadcasting

algorithm, 775Probability density function (PDF), 32Probe packets, 776Process ID (PID), 647Processing elements (PEs), 136

RTL schematic, 4 9 4 PE array, 142fRTL schematic, single PE, 142f

PRODIGY, 409Prodom, 787Projected-Database Utility (PDU), 50, 54–55PROMELA model, 416

Prosite, 787Protein function, prediction method of,

789–790data reconfiguration using under-sampling,

791fdataset reconfiguration, 790feature selection, 790–792weighted IPR, 792, 794–795

Protein functional site, 786Prototyping system, multi-core

HUINS SoC master 3 board, 140fmulti-core embedded system, 137, 138freference multi-core architecture, 137reference multi-core array, 138fsynthesis results of, 143tsystem parameters, 138–139, 139t

Provable Data Possession (PDP), 186Provider Link State Bridging, 566PSO-SVM, 330Public key cryptography, 77

cluster formation, 80–81Public key infrastructure (PKI), 588Public LAN, 128Pure recall-based technique, 13Python script, 727

QQ-learning algorithm, 598, 604Qplus-653 kernel, 416

accessing mechanism, 421finter-partition communication of, 417–419message transmission in, 419fnon-error-propagation in, 419–420qplus_ports, 420qplus_queue, 420

q-subsequence, 50Quadratic inference, 113Quadrilateral shape, 888tQuantitative sequence database (q-SDB), 50,

53tQuasi-identifier, 368

RR analyzing tool, 607Radar, 822Radial basis function (RBF), 166, 181, 331Radio Map, 454

interpolation, 506Raspberry pi, 876Rational Rose software, 464

916 Subject Index

Page 23: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Reactive routing protocol, 774Reactor protection system (RPS)

architecture, 88of power plants, 90–92of research reactor, 90

Real radio signal propagation, 507Real time lip synchronization, 635Real time memory analysis

delivering evidences and confirmation, 646digital evidence securement and collection,

646investigation and analysis, 647investigation preparation, 645–646memory dump process, 648memory imagification for process, 648process list extraction, 647real time data analysis, 648–650real time data investigation procedure, 647response, 646SNS investigation procedure by, 644–645web browser memory use list, 648, 649f

Real time resource reallocation for betterresource utilization (RTRRBRU),44–45

Real time vowels recognition, 635Real-time data analysis, 557Real-time operating systems (RTOS), 416

ARINC 653 (see ARINC 653 Standard)Qplus-653 kernel (see Qplus-653 kernel)

Recall-based graphical techniques, 12Received signal strength (RSS), 453, 507

map resolution with, 456–457Recognition- based graphical techniques, 12Reduced Sequence Utility (RSU), 50, 53–54Reference many-core processor, 195, 196fRegister-transfer level (RTL), 198Regulatory Guide 5.71, 1.152, 88Relay node selection, 756fReno protocol, 2Re-routing algorithm, 746Residual analysis module, 848Residual energy, 774, 776

variance of, 782–783, 783tResource reallocation algorithm, 45–46Respondent-defined privacy protection

(RDPP), 367RF (RandomForest) classifier, 581

machine learning algorithm, 578performance comparison, 582fperformance indicator, 583t

RFIDs, 203application domain, 461tag and sensor tag application, 204f

RGB color mean figure, 343f

Roads in target area, 748fRobots

adhesion system and impeller, 689fcross development model, 692fdesign and structure, 688–691effective battery duration, 693tembedded image processing system,

691–692existing forces analysis, 691fimage processing and communication, 693fimage processing procedure, 693fimprovements in, 691foverall exterior view of, 690fpayload capacity, 693tposition with payload, 694fspeed in various direction, 693t

Role Based Access Control (RBAC), 517, 519Rotor unbalance fault (RUF), 179Round-Robin scheduling model (RRSM), 46Route error (RERR) message, 4Route reply (RREP) message, 4Routing algorithm, 745. See also Bellman-

Ford distance vector routing algorithmcalculating estimated travel time, 746searching optimal path, 745traffic information modelling, 745

Routing success probability, 783, 783tRREQ message, 775RSA cryptosystem, 38RSSI (Received Signal Strength Indication),

359

SS/Key algorithm, 76

generation of set of passwords, 79fpassword generation phase, 78registration phase, 78

S5PV210 microprocessor, 688Saccades, 803Safe and Saving index (SS-index), 248, 250,

251fSAGE (Standard-based Sharable Active

Guideline Environment), 409SAX parser, 549SCADA (Supervisory control and data acqui-

sition) systems, 525architecture, 526general layout, 527fModbus protocol, 526, 528servers, 536

SCADA Firewall, 537Scalable streaming service, 306Scalance, 537

Subject Index 917

Page 24: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Scan attack, 528, 529tScatter partition, 104, 108Scissors gesture, 733, 734fS-Concatenation operation, 53Script-based learning, 599SDbitmap, 497Secure and adaptive transmission control pro-

tocol (SA-TCP), 2, 3–5security, 5–6simulation, 6–7

Securityaccident time period, 844, 851equipment, 845related infra logs, 844, 851related issues, 843

Security authentication methods, 314Security control system, 222, 223, 227Security function, 468, 469t

DSD, 468Security Information and Event Management

(SIEM), 223–224Security intelligence technology, 554–555Security parameters, 3Security Service Provider (SSP), 378, 379,

380, 381, 382SEED-256, 255

data encryption conversion code, 226fSelf-Adaptive Navigation System (SeNS), 740

comparison of existing systems, 743tdesign, 742, 744–745scenario, 747simulator, 746–747system requirements, 742

Self-adaptive software, 749Self-awareness privacy, 367

protection (see Privacy-preserving datacollection)

Self-enforcing privacy (SEP), 367Semi-digital smart integrated circuit design,

289cyclic type analog-to-digital converter, 289successive approximation (SAR) converter,

290TVC (see Time-to-voltage converter

(TVC))VTC (see Voltage-to-time converter

(VTC))Sensor nodes, 76, 82

authentication by user, 81f, 82–83Sensors, 203, 834Sequence Weighted Utilization (SWU), 49Service models, 854, 860

scenario, 674–675Service process management module, 869

Serviceability limit states, 810Serviceability performance, 810Session hijacking, 2Set Top Box (STB), 307Shadow area detection, 829fShannon theory, 30Shortest path bridging (SPB), 566SIEM (Security Information and Event Man-

agement), 555SIFT descriptors, 506SIFT flow, 424, 425SIFT matching test, 507fSIFT-based building matching, 512Signal coverage, 358, 362Signal interference, 358

to network throughput, 360–361simulation topology, 361tin WiFi networks, 359

Signal to interference plus noise ratio (SINR),30

Signature signal, 38–39generation, block diagram, 39f

Signature-based detection, 576Simple Additive Weighting technique, 242Simple vector filter, 120Simplified inference, 113Simulated annealing, 58

with compact index, 60fSimulated log events, 849fSimulating synthesized automata, 434

arbiter, 434, 435, 436, 437robots, 434, 435, 436, 437screenshot of, 435fsetting of, 435fspecifications of, 436f

Simulationdesign condition for, 714tdriving environment for, 714troad condition for, 714f, 715f

Simulink, 764SINBAPT (Security Intelligence techNology

for Blocking APT), 5557, 58, 562cyber-targeted attack response system, 557fplatform specification, 561f

Single instruction multiple data (SIMD), 194Single vowel recognition, 638, 640tSituation information model for smart logistics

service, 672–674coordinate information, 673

Situation information-based intelligent logis-tics service model, 671–672

SK Communications hacking, 554Skin aging

and alcohol consumption, 265

918 Subject Index

Page 25: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

and sleeping, 265Skin hereditary traits

calories and exercise intensity, 266tdata for normalization, 264–265evaluating, 266–267extrinsic aging factors, 263–264skin texture, 263statistical estimation of, 267

Skin texture ages, 262Skin type and skin aging, 262SKIP mode, 272Sliding gesture, 733, 734fSlow start threshold (ssthreshold) value, 4SMART, 787Smart devices, 314, 467, 468, 470

authentication processes, 318face recognition, 315false acceptance rate (FAR), 318false rejection rate (FRR), 318graphical password system, 316key generation mechanism, 316, 317fkey space, 316–318keystroke dynamics-based user authenti-

cation (KDA), 316locking systems, 469fpassword, 315pattern lock, 315PIN, 315security threats in user authentication in,

314–315Smart integrated circuits. See Semi-digital

smart integrated circuit designSmart logistics service, 670

situation information model for, 672–673,673f

structure chart, 672fSmart phone, 467, 575SmartRack device, 222SMO, 769, 790t, 794tSMTP (email), 66Social network service (SNS), 575, 643, 644,

863, 864digital forensic of, 644identification of, 645information collection, 646information related to conversation of, 649process of acquiring, 645searching digital evidence, 651tuse in web browser, 650fuser networking information, 649user, timeline information of, 650

Social Networking Service (SNS), 468Soft threshold function, 147Solar power, 883

SOX act, 128Speaker dependent recognition, 640Spectrum sensing, fuzzy for

membership functions of fuzzy sets, 148fproposed scheme, 147–148, 148fROC curves of, 150f, 151fsimulation results, 150–151wavelet denoising, 147

Speech recognition, 634, 635, 638, 640Speed-limit signs

adjacent pixel, labeling, 123fboundary information extraction, 122–123boundary smoothing, 121–122detection and recognition of, 120–121noise elimination, 121–122performance evaluation, 124–125red-colored ring, boundary recognition,

122, 123fspeed recognition, 124system design, 124, 125f

SPIN model checker, 416Splunk application, 555Spot instances, 483, 484Spot prices, 484Square based pyramid, 889tSRDP, 3Standard for Exchange of Product data

(STEP), 238Stateful packet inspection (SPI), 537Static analysis, 576Statistical prediction engine, 845, 846Statistic-based prediction engine system, 846f

generation, 847, 847fintegrated log analysis, 847–848prediction with regression analysis, 850fprediction with time-series analysis, 850f

Statistics module, 848Statistics-based log analysis, 844Steel stress calculation, algorithm for

computation of steel stress, 811–814crack width formulation, 814–817nonlinear material characteristics of con-

crete, 810–811Steganography, 22, 698, 705, 706Stereo camera, 298Stereo image recording (SIR), 401, 402Stereo images, 302f, 303f

PSNR numerical values’ comparison, 303fStereo matching, 297Stereoscopic watermarking, 402Stereotype creator, 463–464, 464f

configuration file, 464, 465fupdate registry information, 464

ST-FeatCAPP, 238

Subject Index 919

Page 26: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Storage area network (SAN), 128, 131Storage bounded continuous queries (SBCQ),

204–205, 206update algorithm, 208f

Strain and bond stress distribution of tensionmembers, 815f

Streaming video, intermediate node for, 307Strength limit states, 810Stresses in steel, 810String topology, 7Structural limit states, 809–810Stuxnet, 536Subscription pricing, 854, 855, 856–857Sub-task table, 599, 600t, 603t

sub-tasks by virtual agent, 602fSubtractive clustering method, 194–195

evaluation metrics, 198, 199texecution time of, 199–200MR images, 199fparallel implementation of, 196–198parameters for, 196tPE configurations, 199tPE configurations for MR images, 200fprocess computing first potential value,

197fsystem utilization, 198, 200f

Suction-based adhesion system, 689Sudden acceleration (SA), 250Sugeno-Takagi models, 112Superframe duration (SD) index table, 496

selection criteria, 498Superframe, 496Support vector machines (SVMs), 165, 262,

330–331, 790t, 823data classification using, 578fmalware detection via, 577–578in measuring skin aging, 262optimal hyperplane, 331fRF (RandomForest) machine learning

algorithm, 578Support vector regression (SVR), 180–181SWISS-PROT, 787, 788, 796SYN flooding, 2Synopsys design compiler, 198System info module, 848System on Chip (SoC) integration, 129System whitelist, 531

TT Map, 741Tablet PC, 254, 314, 315

Tahoe protocol, 2Taint analysis, 576, 577. See also Dynamic

analysis-based detectionTask scheduling, 212, 213, 216, 219Task success probability table, 600t, 601

through Q-learning, 602Task-Role Based Access Control (T-RBAC),

517, 520TCP New Reno, 3, 4TCP/IP session analysis, 537Test simulation module, 848Texture patterns, 179Thayer’s emotion model, 339–340, 340f, 341Thick clients, 211Thin clients, 211Thin-thick clients, 212, 213, 217, 219Third-party auditor (TPA), 186Threshold cryptography technique, 3Tick Tock, 129TIGRFams, 787Time division multiple access (TDMA)

scheduling, 33Time-frequency code (TFC), 30Time-to-voltage converter (TVC), 290

circuit implementation of, 291fCMOS switch, 294error analysis of, 290–293error performance of, 292–293macro models for, 294f

TinyVM, 720, 721Tolerance level, 890TOMTOM, 741Torque assist systems (TASs), 708–709

complete ASM block layout for, 709fconfiguration of an HEV for, 709fefficiency map, 713felectrical parts, 709–710engine, 710–711, 711fintegrated controller, 711–712, 712f

Torque Pro, 248Touch screen, 468, 470, 472, 616Tracking faces, 383Traffic information

generate and collect, 741infrastructure for generate and collect,

740–741interactions among components, 744fproviding service, 741–742

Transfer control protocol/internet protocol(TCP/IP), 662

Transform unit (TU), 272Transformed continuous query (TCQ), 204

920 Subject Index

Page 27: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Translation-rotation matrix, 766Transmission control protocol (TCP), 2Tree pruning algorithm, 272Trial-and-error method, 810Triangle shape, 888tTrOASIS, 741, 742Trusted Software Monitor (TSM) system

authentication protocol phase, 283authorization protocol phase, 283–284authorization, 281efficiency, 285thome authentication server (TSMH), 286registration protocol phase, 283security, 285tsecurity requirements, 280–281system symbol, 282ticket renewal protocol, 284ticket renewal protocol diagram, 282fticketing method, 281–282TSMH authentication message, 286f

Trusted third party (TTP), 347, 589Tweet message, 881fTwit status, 880Twitpic image, 880Twitter micro-blogging, 876, 877Two-dimensional PE array, 195Two-part tariff, 854, 855, 858–859

UUbiquitous computing, 358Ubiquitous wireless networks, 289, 363 See

also Wireless fidelity (Wi-Fi)u-health portal service, 410

application case and evaluation, 412–413guideline for time-related knowledge,

410–411knowledge authoring method, 411–412model connected to CDS, 411system architecture for, 412

Ultimate limit states, 810Ultrasound, 678Ultra-wideband (UWB) devices, 29, 31Unauthorized access, 538, 540

multiple access control filter based block-ing of, 540–542, 543, 544

Unified modeling language (UML), 461Universal Description, Discovery and Inte-

gration (UDDI), 869Updater module, 848User authentication, 79–80

analysis in smart devices, 315–316biometric-based identification, 314components comparison, 84t

guessing attack, 83impersonation attack, 83replay attack, 83rhythm-based authentication scheme,

316–317in smart devices, 315stolen-verifier attack, 83transmission comparison, 84t

User datagram protocol (UDP) communica-tion, 662

User’s behavior analysis, 800User-centric Security Service Model (USSM),

374, 375, 378data storage protocol, 378–379, 378fdata usage protocol, 379–380, 380frequirements of, 375

USpan, 50UV exposure and skin aging, 262, 266UWB-WPAN, 31

VVacuum suction techniques, 688VANET (Vehicular Ad-hoc Network), 751

GZTR Protocol (see GZTR (GeographicalZone Based Two-tier Routing)algorithm)

routing, problems of, 752fVapnik-Chervonekis dimensional space, 331Variables transform module, 848Vehicle, 247–248

fuel used in, 251safety, 763speed (VSS), 249

Vehicle study research, 824tdetection and tracking schemes, 824tdetection and verification, 824false positive, 829, 830ftest video environments, 830ftest video results, 830ftrue positive, 829, 830f

Vehicle surroundings monitoring systemanalysis model for, 764–765block diagram of, 765fmechanism of, 765–768principles of, 766fsafe distance secured by AEBS, 770fsimulation scenario, 768, 769fverification of, 768–769warning zone and relative angle, 767fwarning zone changes in simulation, 770f

Vehicle-to-infrastructure (V2I) communica-tion, 754

Vehicle-to-vehicle (V2V) communication, 754

Subject Index 921

Page 28: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Vehicular tracking, 76Verilog HDL, 141Vertical farm, 835, 839

context-aware control service, 835–837controlled environmental data, 837controlled target, 838tinference rule, 840

VESSEL segmentation in the Lung 2012(VESSEL12), 684

Vessel traffic service (VTS), 545memory usage, 547–548, 549fmemory usage, comparison, 548performance time, on Android, 548fperformance time, on PC, 547, 548fpull-based parsers, 547push-based parsers, 547XML parser in, 546–547

VESSEL12 DB, 684Video contents annotation, 800Video processing technologies, 162Video source, 799Video watermarking. See DIBR video

watermarkingVirtual agent learning processes, 599, 600f,

601learning objectives, 6023D models of virtual agent, 603f

Virtual desktop infrastructure (VDI) applica-tions, 128

Virtual human learning processes, 599, 600f,600–601

3D models of virtual human, 603fVirtual machines (VMs), 719

codeword sequences, 724, 725fdecoder mechanism, 723decoding time and preloaded branches,

725findirect branches, 723instruction pointer (IP), 722and Latendresse’s algorithm, 726and Mibench benchmark suite, 727fspeedup of, 727f

Virtual Private Network (VPN), 222Visual C#.Net, 817Voice recognitions, 635–636Voltage-to-time converter (VTC), 290

circuit implementation of, 291fCMOS switch, 295error analysis of, 290–293error performance of, 293macro models for, 294f

Voronoi diagram, 31Voronoi tessellation, interpolation, 454, 457Vowel recognition processing strategy,

638–640

WW3C standard, 240Wall climbing intelligent mobile, 689fWar walking/driving/carting, 222Watermark embedding on DWT domain, 24fWavelet decomposition (WD), 162, 167, 178Wavelet denoising scheme, 147–148Wavelet transform, 146, 147, 149WAZE, 740Wearable device, 616Weather-proof housing, 883Web Ontology Language (OWL), 239Web Ontology Language service (OWL-S),

663Web search, 575Web Service Definition Language (WSDL),

869Web Services, 66Web-hard system, 593fWeighted Information Fragmenting Scheme

(WIFS), 374, 376algorithm proof, 377defragmentation process of, 377fragmentation process of, 376–377

Whitelist security technology, 476–477components of, 477tconfiguration diagram of, 477f

Whitelists, 531Wireless ad hoc networks (WANETs), 2Wireless communication technology, 834Wireless connection, 306, 310, 311Wireless devices, 440, 442Wireless fidelity (Wi-Fi), 248

-based indoor localization techniques, 453-based localization, 506connectivity, 883direct, 444networks, 358peer-to-peer (P2P), 444routers and access points, 444tethering, 444

Wireless Local Area Network (WLAN), 359Wireless personal area networks (WPANs), 29Wireless sensor networks (WSNs), 76With Coffee application, 655

922 Subject Index

Page 29: Author Index - link.springer.com978-94-017-8798-7/1.pdf · database, 428 ICIA algorithm, 427–428 samples, ... 816–817, 819 ACK storm, 2, 6 ... ARINC 653 Standard, 416

Workflow scheduling algorithm, 484, 485,488f

considering task processing rate, 485cost, comparison of, 493ffailure time, comparison of, 491finitial workflow function, 488fmapping relation of workflows and

instances, 486frecalculation operation of assigned task,

486frecalculation point of task size, 486frecalculation workflow function, 488fresource types, information, 489trollback time, comparison of, 492fsimulation, parameters and values for, 489ftotal execution time, comparison, 490f

XXmlPullParser-based library, 546XMPP (chat), 66XOR operation, 39X-Ray, 678

YYCbCr color space, 163, 164, 167

Zz-axis motion mask (ZMM), 404Zero-crossing rate, 393Zone and conduit model, concept of, 536Zone based routing, 752

Subject Index 923