Upload
dophuc
View
225
Download
4
Embed Size (px)
Citation preview
Author Index
AAhn, Kyung Jin, 305Almuairfi, Sadiq, 11Alnumay, Waleed S., 1Aritsugi, Masayoshi, 169
BBae, NamJin, 669, 833Biçakçi, Mert, 65Bong, Wonsun, 453, 505Bu, Heehyung, 37Bui, Tuan-Anh, 211Burgstaller, Bernd, 719Byun, Yun Sang, 515
CC�akir, Mehmet Ulas�, 65Chae, Seung-Hoon, 677Chang, Beom-Hwan, 535Chang, Ku-Young, 347Chatterjee, Pushpita, 1Chen, Guey-Shya, 337Chen, Hsing-Lung, 119Chen, Huaming, 321Chen, Ming-Sze, 119Chilamkurti, Naveen, 11Cho, Hong, 763Cho, Kyungeun, 597, 661, 731Cho, Seoungjae, 597, 661, 731Cho, YongYun, 669, 833Choi, Byong-Sam, 853Choi, Hyung Rim, 863Choi, Jung-Won, 103, 111Choi, Kyu-Jin, 447Choi, Mi-Jung, 575Choi, Young-Hwan, 261
Chun, Se-Hak, 853Chung, Kidong, 297Chung, Tai-Myoung, 535, 553Chung, Yongwha, 677
EElovici, Yuval, 439Eun, Kim Gyoung, 707
FFang, Yung-Chin, 127
GGao, Yuxiang, 127Ghosh, Uttam, 1Goswami, Kalyan, 271Guri, Mordechai, 439
HHam, Hyo-Sik, 575Han, Youngshin, 43Hang, Su, 719Heo, Gyunyoung, 87Hong, Bonghee, 203Hong, Chee Ken, 875Hong, Dowon, 347Hong, Gwang-Soo, 821Hong, Sangjin, 799Hong, Soon Goo, 863Hong, Youn-Sik, 75Hoong, Poo Kuan, 875Hoseini, Zaniar, 289Hu, Jun, 321Hu, Shu-Hua, 119
J. J. (Jong Hyuk) Park et al. (eds.), Frontier and Innovation in Future Computingand Communications, Lecture Notes in Electrical Engineering 301,DOI: 10.1007/978-94-017-8798-7, � Springer Science+Business Media Dordrecht 2014
895
Huang, Jiun-Long, 49Huang, Yi-Hung, 329Huh, Eui-Nam, 211Hung, Jason C., 321, 329Hung, Pham Phuoc, 211Hur, Junbeom, 229Hwang, Eenjun, 261Hwang, Kwang-il, 495Hwang, Soon-Hak, 853Hwang, Won-Joo, 21
IIm, Subin, 615
JJang, Si-Hwan, 57Jang, Uijin, 473, 565Jang, WonAng, 247Jang, Won-Chul, 177Jang, Yu-Jong, 643Jeong, Chisoon, 719Jeong, Hohyeon, 739Jeong, Hwa-Young, 313Jeong, In-Kyu, 153Jeong, Jaehoon (Paul), 739Jeong, Kanghun, 423Jeong, Young-Sik, 313, 467Jhang, Kyoung-Sun, 525Jho, Nam-Su, 347Jin, Daxing, 597Jo, Woo-Seung, 447Joo, Sang-Hyun, 401, 57Jung, ByungOk, 587Jung, Daeyong, 483Jung, Euihyun, 605Jung, Jaehee, 305, 785Jung, Jai-Jin, 313Jung, Woo-Tak, 95
KKang, Dong-Ho, 525, 535Kang, Min-A, 447Kang, Myeongsu, 135, 153, 161, 177, 193, 393Kang, Won Min, 313Karumathil, Aadarsh, 885Kim, Byeong-Woo, 763Kim, Byoung-Koo, 525, 535Kim, Byung Wook, 29Kim, Byung-Gyu, 271, 289, 29, 821
Kim, Byun-Gon, 103, 111Kim, Cheol-Hong, 153, 193Kim, Cheonshik, 697Kim, Daehoon, 261Kim, Daekeun, 297Kim, Dong-Hoon, 75Kim, Hwa Jong, 357Kim, Hwan-Hee, 575Kim, Hyun Jong, 863Kim, Hyunjoo, 553Kim, Hyun-jung, 383Kim, Hyun-Woo, 467Kim, Ikkyun, 553Kim, Jaehyo, 615Kim, Jaekwon, 43Kim, Jeong Ah, 409Kim, Jeong Nyeo, 279Kim, Jinuk, 615Kim, Jonghwa, 37Kim, Jong-Myon, 135, 153, 161, 177, 193, 393Kim, Juyoung, 605Kim, Kwan-Woong, 103, 111Kim, Kyungsup, 95Kim, Myung Ho, 365Kim, Myung-Sup, 575Kim, Sanghoon, 423, 687Kim, Sungho, 37Kim, Sung-Soo, 57Kim, Taeyoung, 43Kim, Yong Cheol, 453, 505Kim, Yong-Kab, 103, 111Kim, Young-Hyuk, 221Kitasuka, Teruaki, 169Ko, Kwangman, 843Ko, Young-Woong, 853Koh, Byoung-Soo, 587Koo, Dongyoung, 185, 229Koo, Insoo, 145Krasner, Anatoly, 439Kwak, Jin, 515, 643Kwak, KyungHun, 669, 833Kweon, JuWan, 247Kwon, Gihwon, 415, 431Kwon, Jihye, 615Kwon, Ki-Ryong, 21Kwon, Ohmin, 185Kwon, Ryoungkwo, 431
LLee, Chang-hun, 383Lee, ChangYong, 247
896 Author Index
Lee, DoHoon, 247Lee, Eung-Joo, 21Lee, Eunseok, 739Lee, GiYeol, 809Lee, Goo Yeon, 357Lee, Gwanghyung, 253Lee, Hae-Yeoun, 401Lee, Heung Ki, 305, 785Lee, HwaMin, 809Lee, Hyun Mi, 863Lee, Jae Dong, 313Lee, Jae-Gwang, 221Lee, Jae-Kwang, 221Lee, Jae-Pil, 221Lee, Jeesoo, 687Lee, Ji-Won, 401Lee, Jong-Hyeok, 271Lee, Jongsik, 43Lee, Jung-Ryun, 773Lee, Jung-Won, 739Lee, Ki Young, 75Lee, Kye-Shin, 289Lee, Kyu-Chul, 447Lee, Kyungmin, 203Lee, Min-Feng, 337Lee, Sang-Young, 461Lee, Seongyoon, 615Lee, Seung-Hwan, 751Lee, Suk-Hwan, 21Lee, Yong, 357Lim, Hyungmin, 473Lim, Il-Kown, 221Lim, JongBeom, 483Lim, Joonhyung, 605Lin, Kuan-Cheng, 329Lin, Yung-Tso, 329Liu, Hongzhe, 731Lu, Yuqian, 237
MMafole, Prosper, 169Manabe, Yuki, 169Moon, Chang Hyun, 313Moon, Hae-Min, 677Moon, Hyeonjoon, 423Moon, Nammee, 799
NNa, Jung-Chan, 525, 535Nam, Sung-wook, 495Namgung, Hyun, 221Nasridinov, Aziz, 653
OOh, Jung-Min, 799
PPan, Sung Bum, 677Park, Chang-hyun, 863Park, DooSoon, 809Park, JinGwan, 247Park, Jong Hyuk, 313Park, Keon-Jun, 103, 111Park, Minoh, 43Park, Namje, 545Park, PyungKoo, 373Park, Sachoun, 415Park, Sang-Hyun, 773Park, Su-Wan, 279Park, Yong-Hun, 135Park, Young-Ho, 653Piao, Yongxu, 203
QQi, Ji, 321
RRew, Jehyeok, 261Rho, Seungmin, 261Ryong, Beak, 821Ryou, JaeCheol, 373, 95Ryu, HoYong, 373
SSenthil Kumar, T., 885Seo, Junsang, 161, 193Seo, SangHo, 587Seok, Seung-Joon, 751Shao, Qun, 237Shin, Dongil, 253Shin, Dongkyoo, 253Shin, JinSeop, 373Shin, Jinsoo, 87Shin, Kwangmu, 297Shin, Yongjoo, 185Shon, Dongkoo, 161Singh, Chirpreet, 237Son, Hanseong, 87Son, Yun-Hee, 447Song, Bok-Hee, 633Ssin, Seungyoub, 661Stap, Cindy, 127Suh, Changjin, 473, 565
Author Index 897
Sung, Yunsick, 597Suresh, Abhijit, 885
TTan, Ian K. T., 875
UUddin, Jia, 153Um, Kyhyun, 597, 661, 731
VVeeraraghavan, Prakash, 11Vu-Van, Hiep, 145
WWang, Jen-Chieh, 337Wang, Jun-Zhe, 49Wang, Xuan, 321Wen, Low Zhi, 875Weon, Il-Yong, 383Whang, Sun-Min, 633Wong, Kok-Seng, 365Woo, Kim Byeung, 707
XXi, Yulong, 731Xu, Xun, 237
YYang, Ching-Nung, 697Yang, Lei, 321Yang, Seung-Hun, 821Yang, Zong-Hua, 49Ye, Xinfeng, 237Yi, Gangman, 305, 785Yoo, SeongMin, 373Yoon, Hyunsoo, 185, 229Yoon, Sangeun, 653Youn, Taek-Young, 347Yu, Heonchang, 483Yun, Han-Kyung, 633
ZZhang, Jie, 357Zhou, Qingguo, 321Zhou, Rui, 321
898 Author Index
Subject Index
A1-hop neighbor nodes, 774, 776, 778, 779, 7802D-3D conversion, 402, 4063.20 Cyber Incident, 5543D face representation, 423. See also Face
representationaverage face model, 426database, 428ICIA algorithm, 427–428samples, 426, 427scans, 424, 425
3-way chaining authentication, 76, 77, 844 9 4 network, 60t5 9 5 network, 59, 61f5 M pixel CMOS Camera, 68864 bit block encryption, 2277 9 7 network, 59–60, 61f8/4 Hamming code, 25802.1aq Shortest Path Bridging, 5669 9 11 network, 59, 61, 62fAbnormal behavior detection, 554, 556
cyber-targeted attack response system,556–557
large-scale data analysis engine, 557–560using MapReduce, 560, 561f
Absolute temperature (AT), 250Accelerator pedal position, 710, 712, 713, 714fAccess control model, 517, 520
access control module, 520applicability, 522, 523tapplication of policy, 522, 523tcomponents of, 521tcontext controller, 521context information, 517–518data transmittance, 520flexible assignment, 522, 523timmediate response, 522, 523tinformation transmittance, 520policy management system, 521
problem analysis, 518–520review process, 522role management system, 521–522user data, 520
Access control techniques, 522Access point (AP), 174, 441, 444, 453, 454,
5073 9 3 access points, 471Wi-Fi access points, 506, 513
Access Points Routers, 444ACI 318 Code 1995, 816–817, 819ACK storm, 2, 6Active Contour Models (ACM), 679Active pixel (AP), 424Active set top box
ActiveSTB, 308MP4 versus H.264 scalable streaming,
307–308scalable multimedia, 309–310scalable stream, 309t, 310tsimulation environment, 309f
Active Shape Model (ASM), 680ActiveSTB, 307, 308
NS-2 simulator, 308Activity Based Access Control (ABAC), 517,
519Ad hoc TCP (ATCP), 6, 7Adaboost and Haar-like algorithm, 384–385,
388Adaboosting, 769, 790tAdaptive media streaming, 306Adaptive navigation system. See Self-Adap-
tive navigation system (SeNS)Adaptive normalized cross correlation
(ANCC), 298–299Adaptive smoothing (AS), 454, 455, 458, 510,
511foriginal noisy signal, 456f
Adaptive streaming scheme, 306
J. J. (Jong Hyuk) Park et al. (eds.), Frontier and Innovation in Future Computingand Communications, Lecture Notes in Electrical Engineering 301,DOI: 10.1007/978-94-017-8798-7, � Springer Science+Business Media Dordrecht 2014
899
Adaptive support weight (ASW), 298Adhesion force, 688, 690, 692, 695Adhesion techniques, 688Ad-hoc routing. See VANET (Vehicular Ad-
hoc Network)Advanced Driver Assistance System (ADAS),
763, 764, 771Advanced emergency braking system (AEBS),
764, 768, 771braking force of, 768tcommand, 769fsafe distance secured by, 770f
AEEC (Airlines Electronic Engineering Com-mittee), 416
AES-256, 225data encryption conversion code, 226f
Affective computing, 338emotion classification, 339, 340temotions, 339fuzzy cognitive mapping, 340Thayer’s emotion model, 339–340
Ahead-of-time (AOT) decompression, 720Air and fuel ration (AFR), 249AIS, 545Alcohol consumption and skin aging, 262,
264–265, 266Alphanumeric passwords, 12Amazon EC2, 483
resource types, 489tAndroid devices, 580Android malware, 577fAndroid Market, 474Android phone, 254Android systems, 314
operating systems, 315Android vaccine, 479–480
in AV-Test, 480tAngular misalignment fault (AMF), 179ANSI/ISA-99 international standard, 536Anymon Plus, 844AODV (Ad hoc On-demand Distance Vector),
773, 774App Store, 133, 474
App for administrative works, 474App verification system of, 478illegal copy prevention system of, 478–479illegal copy prevention technology by, 479tverification items by, 479t
Application layer access control block, 540Application Programming Interface (API),
434, 673App Store, 478–479
data publishers, 448OS kernel, 417pull-based, 547push-based, 547resource information, 579twitpic, 880for Wi-Fi Direct, 444
Application-specific integrated circuits(ASICs), 136
APT (Advanced Persistent Attack), 554, 556,557, 562
Arden syntax, 409Area defuzzification method, 149ARINC 653 Standard, 416
ARINC 653 APEX (Application/Executive), 416–417
core module componentrelationships, 417
ARPA, 545Array control unit (ACU), 142, 195, 196Artificial intelligence (AI), 238, 598, 599, 662
domain, 338Artificial Neural Network (ANN), 634, 635Attitude Heading Reference System (AHRS),
616specification of, 618t
Attraction force generators, 688Audio classification, 393
GA operators’ generation, 397–398GA-based FCM for, 396–397initialization, 397result, 399t
Audio features extraction, 394–396checking termination criterion, 398feature vector configuration, 396features distribution, 395flow root-mean-square ratio, 394spectrum spread, 394zero-crossing rate, 395–396
Audit mechanism, 186delegation of, 188for outsourced data, 188–189
Augmented Reality (AR), 467–468Authentication signal, 38–39Authentication technology. See also Log
authentication systemintroduction to, 590PKI authentication service, 591
AuthentiGraph, 13Auto-configuration, MRA transform, 680–681AutoFACT, 787Automatic annotation processing, 786
900 Subject Index
Automobile detection algorithmfor blind spot detection, 830, 831cascade-type classifier, 826fdata training process, 825image according vehicle distance, 826fpre-processing image classification, 828fusing proposed feature training, 827fshadow area extraction method, 828fverification process, 825–826
Automobile identification algorithm, 822Automotive simulation models (ASMs), 708Autonomous drive path planning, 732Awase-E system, 13Azimuth, 766
CSego transformation by, 767f
BBack propagation (BP), 91, 104, 105
of BN, 90, 92Background subtraction, 162–163, 877
accuracy measurements, 881, 882f, 883fin car park management, limitations, 881example of, 879f
Backoff-free fragment retransmission (BFFR),172–173
energy consumption, 175fenergy efficiency, 174fwith no contention overhead, 174f
Backpacking, 322, 324Backpropagation neural network (BPNN)
model, 140, 340–341, 341fmapping of, 141process, 342
Basal metabolic rate (BMR) estimation, 264Base area, 889Base station, 76Basic routing protocols, 773Basic safety message (BSM), 765Basic stat module, 847Basic Station Set (BSS), 359Bayesian network (BN), 88, 92, 93Bayesian probability-based imitation learning,
600Beacon scheduling, 496–497
completion time, 501–502slot collision avoidance, 497f
Beacon-enabled mode, 495Bearing fault (BF), 179Behavior execution, 661–662
basic task generation, 663–664inoperability of server and 2D camera,
664–666server protocol for task execution, 666–667
Behavior frequency table by status, 600, 601tBehavior-based detection, 576, 577Bellman-Ford (BF) algorithm, 154
connected routers with different linkweights, 156f
CPU/GPU implementation of, 158fdistance vector routing algorithm, 155GPU-based, 156–158parallel implementation of, 158fperformance evaluation, 158–159using CPU, 157fusing GPU, 157f
Big data, 554abnormal behavior detection based on, 556analysis, 844, 851security research using, 555
Bilinear-pairing, 3Biometric authentication, 18, 383, 886Biometric entropy, 886Biometric system, 12Biomimetic approaches, 688Biosignal based interface
comparison with existing pointing inputdevice, 623, 628–630
interface performance evaluation withEMG intensity, 621, 623
movement path, 622fmoving distance, 625fposition manipulation performance of
interface, 620–621position-control performance model, 622frepeated modified model, 622f, 626f
Bi-stable Processor (BP), 88BIT (Biology Information Technology), 22Bit error rates (BERs), 2, 26, 31, 170, 777
in mutated codon sequence, 26fBits-per-pixel (bpp), 705Blast2GO, 787Blind spot, 764, 822
areas, 823f, 830Block-level deduplication, 230Bluetooth, 248, 475, 476t
messages, 444tethering, 741
BMS-WebView-1, 55, 56fBowed shaft fault (BSF), 179Bridge priority masking, 566
cyclic priority matrix, 569–571and priority matrix, 566–568problem definition, 569
Bring-your-own-device (BOYD), 128Broken rotor bar fault (BRF), 179Bucket boundaries, 348Bucket index ordering (BIO) problem, 349
Subject Index 901
Bucket index ordering (BIO) problem (cont.)bucket boundary determination, 352counter measure, 353cyclic query, 354, 354fin existing bucketing schemes, 352–353random query, 353in range query, 350–351
Bucket-based database management tech-niques, 348
Bucket-based index, 348adversarial model, 349bucket construction and data query,
348–349, 351frandom index assignment, 351t
Building recognition method, 505range of search space, 506f
Bytecode compression methods, 720decompression of, 720
CC/C++ language, 759Caroo pro, 248CarSim, 764Cartesian coordinate system, 46, 765, 889Cartesian equation, 890Cat swarm optimization (CSO), 330, 331–333
seeking mode, 331–332tracing mode, 332–333
CA-TRBAC, 519CEB-FIP Model Code 1990, 814–815Central processing unit (CPU)
-based implementation and GPU, 159thardware specification of, 157tover GPU, speedups of, 160f
Centroid of base, 889Challenge-Response protocol, 186Channel bandwidth, 775Chest CT image, lung segmentation of, 679
histogram of, 682fimage segmentation using MRA Level-set,
681fvolume data of, 683, 685
Choregraphe, 662CIE-rg chromaticity space, 120–121, 121fCINDER (Cyber-INsiDER), 555CKAN (Comprehensive Knowledge Archive
Network), 448functional structure of, 449fsemantic web layer cake, 449f
Class meta-model element, 462–463graphical representation of, 463f
Classification model, 887cross product of vectors, 890
shape, rough representation, 892fshifting plane equation, 891three dimensional shapes, 889ttolerance level, 890, 891two dimensional shapes, 888t
Classification, 330, 890emotion classification, 339GA-based FCM for audio classification,
396–397Client and devices, 439, 440f
broadcasting capabilities, 441validator devices, 441
Climbing robots, 687Clinical decision supporting (CDS) system,
409system architecture for, 412in u-health portal, 411
Cloud, 887, 890Cloud Computing (CC), 44, 48, 128, 186, 212,
323, 483, 854cloud customers (CCs), 212cloud data center, 516cloud manufacturing, 238Cloud Provider layer, 213cloud security, 374customer layer, 213implementation and analysis, 218–219problem formulation, 215–218resource reallocation in, 45–46security assessment, 380–381system architecture, 213–215, 214f
Cloud service pricing, 854monopoly provider, 855
Cloud Service Providers (CSPs), 186, 374,375, 381
storage service, 186Cloud services, 322, 323, 374, 854Cloud storage technique, 186, 374
bilinear map, 187cloud service provider (CSP), 231computation cost, 190tcomputation overheads, 233, 234tconstruction, 188–189data uploader, 231deduplication over encrypted data (see
Deduplication over encrypted data)definition, 187–188notation, 190tperformance evaluation, 190–191security analysis, 189–190storage overheads, 233, 234ttag-generation time, 191fupdater, 231verification time, 191t
902 Subject Index
Cloud-based approach, tool selectionautomatic query generation, 241–242implementation, 243–244resource virtualization, 240–241suitable tool, selecting, 242–243tool matching scheme, 239–240
Cluster estimation. See Subtractive clusteringmethod
Cluster formation, 80–81Cluster-head (CH) node, 80Clusters, 81fCMOS 0.35 lm technologies, 290CMOS 65 nm technologies, 290Co-creation, 864
cases, 865tCo-creation platforms
block diagram of, 869fcomponents of, 869tconceptual diagram of, 868fdesign, 864–866functions of, 866, 867tproduct development, 871–873product planning, 870–871sequence diagram, 872f, 873structure and components, 868–870
Coding DNA sequence (CDS) watermarking,22
goals of requirements, 23Coding sequence watermarking, 22Coding tree block (CTB), 272Coding unit (CU), 272Codon numerical mapping, 24fCognitive radio (CR) technology, 145
system model, 146–147Cognitive radio sensor network (CRSN), 146Cohen-Daubechies-Feauveau (CDF) biorthog-
onal wavelets, 25Coincidence Processor (CP), 88Cold chain management, 203
FCQ for (see Floating continuous query(FCQ))
RFID tag application in, 204fsensor tag application in, 204f
Collective services, fabricated data to, 441Collision, 733Color pixel recognition, 162Color segmentation, 119, 163–164Command and Control (C and C) server, 607Command filter, 541Compact index (CI), 58Compute Unified Device Architecture
(CUDA), 154–155C code, main function of, 159f
Computer communication environment, 843
Computer image analysis, 678Computer numerical control (CNC) machine
tools, 241Computer Reservations Systems (CRS), 322Computer vision, 800
-based fire detection, 162problem, 505
Computer-Aided Process Planning (CAPP)systems, 238
Computerized Tomography (CT), 678Congestion avoidance, 5Congestion window (CWND), 3, 8Congestion window limit (CWL), 3, 8Constant bit rate (CBR), 174Constructive sparse positive realization
method, 98–100, 101Content providers (CPs), 587Contention Aware Scheduling (CAS) algo-
rithm, 216Contention free period (CFP), 496Context information, 517–518
aggregator, 518interpreter, 518widget, 518
Context-aware control service, 834–835abnormal status inference, 841fcollecting and categorizing information,
837–838context deduction, 835context modeling, 835control service process, 839, 840fcontrol target, 838tcrop information, 837tinference rule, 840ontology model for, 838fstructure of, 835–837system components, 836tvertical farm environment, 836f
Context-aware GUI based logistics service,670
Continuous active mode (CAM), 170Continuous query, 203, 204
processing performance, 208Control systems, 88, 96, 222, 225, 536, 537
blocking unauthorizedaccess to, 540, 541
categorization of network attacks against,538f
Control theory, 119Conventional hardware routers, 154Converged network adapter (CNA), 131Cooperative safety system, 764Co-privacy, 367Coprocessor, 95
Subject Index 903
Correlation analysis, 554, 555, 556, 558, 560,844
CPU branch target buffers (BTBs), 721Crack width calculation program, 817fCrack width formulation, 814
ACI 318 Code 1995, 816–817calculation, comparison of, 818fCEB-FIP Model Code 1990, 814–815Eurocode 2, 816structural performance verification of
JSCE, 816CRAE (Co-Relational Analysis Engine),
557–558Crisp rules, 104, 108CSA (Cloud Security Alliance), 374CSMA/CD protocol, 358CSO-SVM, 330CU splitting termination (CST), 272–274, 278Cued-recall based technique, 13Current time stamp-based travel time, 748tCustomer relationship management (CRM),
127Cutting tools ontology, 238, 239, 241, 244Cyber genome programs, 555Cyber security, 87Cyber security evaluation index (CSEI), 89Cyber security risk model, 88
for power plant RPS, 91fCyber threats, 528
Application Protocol attacks, 529, 530tflow authentication, 532–533flow whitelist, 533fIP packet filtering, 529–530network intrusion detection, 530network protocol attacks, 528, 529tsystem authentication, 531, 532f
Cyber-attacks, 526, 537in SCADA networks, 528, 531, 534
Cyber-targeted attack, 554response system, 556–557structure of, 557f
DDalvik Machine, 584Data anonymization, 366Data collection, 365Data editing module, 847Data hiding, 697
512 9 512 grayscale cover images, 704fissues with, 697–698matrix encoding, 698
Data import module, 847Data integrity, 186, 191
Data mining techniques, 606, 607Data sharing, 447–448
and LOD module, 451fmodule definition, 450platform architecture, 450, 451fplatform design, 449
Data transfer module, 124Database management system (DBMS), 347Daubechies 4-tap filter, 165DC coefficient, 39DC motor, 692DCF inter frame space (DIFS), 171DCT coefficient, 38DE2-70 board, 124, 125Decentralized workflow scheduling systems,
485Decoder, block diagram of, 40fDecoding procedure, 703Deduplication over encrypted data, 231–233
audit of outsourced data, 232–233initial upload, 231–232, 232fretrieval of outsourced data, 233subsequent upload, 232system setup, 231update of outsourced data, 232
Deduplication technique, 230bilinear Diffie-Hellman (BDH) assumption,
230bilinear map, 230
Deep packet inspection (DPI), 537Default access control filter, 542fDefault filter, 540Delay time in routing process, 783, 783tDenial of Service (DoS) attack, 89Denoising scheme, 148–150Depth-image-based rendering (DIBR), 401,
402Description logic (DL) queries, 241, 242
generation procedure, 242Detect accident (DA), 250Deterministic and Synchronous Multi-channel
Extension (DSME), 496–497enhanced DSME design, 499–500, 501f,
502ffirst experiment, 498–499revised algorithm, validity of, 501–5022nd revision, 500
DIBR video watermarking, 402embedding, 402fidelity test, 405robustness test, 406spatial embedding, 403–404, 403ftemporal embedding, 404visual quality results, 406t
904 Subject Index
watermark extraction, 405Digital forensic
investigation procedure, 645fof SNS real time data, 644
Digital like design concept, 290Digital optical processor, 96Digital rights management (DRM), 37
three SD videos from, 41fDigital signal processors (DSPs), 136Digital video frame obfuscation method,
39–41decoder, 40fencoder, 40fhuman visual system, spatial frequency
response of, 40fSD videos, 41f
Dijkstra algorithm, 325Direct attached storage (DAS), 128Directed Acyclic Graph (DAG), 215, 484, 787
sample, 216fDiscontinuity preserving smoothing (DPS),
454, 510average error in localization, 512fIDW-interpolated map, 511and path loss model, 455freconstructed radio map, 511Voronoi-interpolated map, 511
Discrete Cosine Transform (DCT), 638Discrete phase-type (DPH) distribution, 99,
100Discrete-state discrete-time Markov chain, 99Discretionary access control (DAC) scheme,
517, 519, 523tDistance evaluation technique (DET), 180,
181, 182Distributed coordination function (DCF), 171,
173Distributed Data Centers (DDCs), 378, 379,
380Distribution function module, 848DNA copyright protection, 22, 23DNA crypt algorithm, 22, 25DNA cryptography, 22DNA sequence watermarking, 23–25DNA steganography, 22DNA Watermarking, 22DNP3, 526, 530, 536, 537, 544DO-178B certification, 416DOM parser, 546, 548, 549Domain Name System (DNS), 605
cache, 607Korea National DNS, 607, 608flog analysis, 609, 611, 612logs, 606, 607, 608, 610, 612
query, 606servers, 606, 612
Domestic Android App Stores, 478Domestic simple security management, 844DOM-parser-based EtriIVEF library, 546DoS (Denial-of-Service) attack, 89, 528, 529t,
537Drag gestures, 733, 734f, 735, 736fDraw Sequential Direction (DSD), 468
direction cognition of, 469fdiverse locking systems, 469t
Draw-A-Secret technique, 13Drivetrain, 711f, 716Driving behavior, 248, 252DRLES speed function, 684DRSLE-based method, 680DSDV (Destination-Sequenced Distance-Vec-
tor), 775dSPACE, 708DSR (Dynamic Source Routing), 773, 774,
775Duqu, 536DWT (discrete wave transform)
-based watermarking, 22coefficients, 22, 23, 24, 26on multi-core architecture, 141f
Dynamic analysis, 576, 844-based detection, 577using CarSim, 764
Dynamic datacenter, 128Dynamic neural fields (DNF), 598Dynamic random topology, 6–7Dynamic time warping (DTW), 262
extrinsic aging factors and skin texture age,268f
in measuring skin aging, 262, 266–267
EE2BOX’s EBIMU-9DOFV2 product, 617Eagle mGuard, 537Earliest Finish Time (EFT), 217, 218Earliest Start Time (EST), 217Early fire detection, 161Early warning systems, 66, 70–72, 72fECDIS, 545Eco-driving, 248, 252, 740Edge movement, 694f. See also RobotsEEPR algorithm, 778
advanced, 778–779examples, 779f, 780fperformance metrics, 782–783simulation setup, 781–782
Eigenfaces, 388, 389, 390f
Subject Index 905
Electronic Stability Program (ESP), 710E-mail, 468Embedded image processing, 691–692EMG sensor, 618
abductor digiti minimi, 619fgraphic input using, 621fand quasitension, 619f, 627f
EMG-based interface, 616Emotion classification, 339, 340tEmotions, 339Empirical mode decomposition (EMD), 178,
698e-Navigation, 545Encapsulation, 588–589Encryption application model, 222Encryption key, 374, 377, 378, 379, 380, 381,
382key management, 375, 376
Energy detection, 146Energy-efficient Probabilistic Routing (EEPR),
775, 784advanced algorithm, 778–781algorithm (see EEPR algorithm)metrics in, 776–777packet forwarding process, 776simulation, 781–783
Energy-Enterprise Security Management (E-ESM), 222, 223f
Engine volume efficiency (Engine VE), 249Enterprise class solution, 128Enterprise computing, 127–129
App store challenges, 133–134components of, 129converged infrastructure, 128, 130, 131,
134deployment, 128, 131, 133, 134enterprise architecture, 129fEthernet speed, 132fexternal storage trends, 132–133memory trend, 130fmultiple roles/processes, 134network trends, 133resources allocation challenges, 133, 134RFS count, 132fsegregated networking, 128, 131server trends, 129–132SSD capacity, 131, 132f
Enterprise security management (ESM),222–223, 844
Enterprises’ information systems, 864Entity-relationship (E-R) diagram, 656, 658fEntriVEF Pull Parser, 546Entropy, 179, 181, 182, 316, 680, 886
coding, 272
password entropy, 19Environment control, 834Environmental pollution and skin aging, 262EON guideline, 409Equal-cost multi-path (ECMP) technology,
565, 566Equal-cost multi-tree (ECMT), 566Erbium-doped fiber amplifiers (EDFAs), 97Error compensation, 802f, 804, 807
gaze data processing, 805fgaze time and monitoring, 806f
Error detection, 390, 822Esper/Storm, 557Ethernet, 128, 131, 536, 692
and ECMP, 566routing, 566speed, 132f
e-Tourism, 323ETX (Expected Transmission Count) metric,
775, 776–777forwarding probability via, 779f
Euclidean distance, 46, 105, 454, 508, 886Euler angle, 616, 617Eurocode 2, 814, 816Event mechanism model, 734fEvil Twrin, 222Exclusive region (ER), 30
-based coverage of receiver, 32f-based scheduling, 31–32scheduling scheme, 30
Explicit Congestion Notification (ECN), 3, 4Exploiting the modification direction (EMD),
698EXPRESS-based data models, 239
EXPRESS standard, shortcomings, 240Extended inter frame space (EIFS), 171Extension name, 464Extracellular matrix (ECM), 262Extrinsic (external) aging factors, 262Eye tracking, 801, 804, 807
errors, 808
FFace labeling algorithm (FLA)
candidate face region, 386continuous labeling between frames,
386–387labeling accuracy, 389–390, 390fprocedure, 387–388results, 389f, 389t
Face region detection and face learningAdaboost and Haar-Like Algorithm,
384–385
906 Subject Index
linear discriminant analysis (LDA), 385local binary pattern histogram (LBPH),
385, 388principle component analysis (PCA), 385
Face representation, 423, 424eigenspace, 427eigenvalue, 427eigenvectors, 427ICIA algorithm, 427–428and Max Planck Institute (MPI) results,
428toptical and SIFT flow, comparison, 425f,
425tshape information, 426texture correspondence, 424vertices correspondence and model gener-
ation, 424–427Facial animation, 634Fast Fourier transform
algorithm, 636analysis, for sentence, 639f
Fast PU decision method, 272, 274–276block motion complexity (BMC), 274and HM reference software 10.0, 276trate-distortion (RD) curves, 277fweight factor for, 275f
Fault classification, of induction motor, 177,178
data acquisition, 178–179data conversion, 179feature extraction, by GLCM, 179–180using SVR, 180–181
Fault signatures, 181, 182fFFriction, 690FGravity, 690Fiber-optic signal processors, 97, 98, 100Fiber-optical signal coprocessors, 96Fibre Channel, 128File-level deduplication, 230Fingerprint Wi-Fi Radio Map, 453–454
average localization error, 458finterpolation, 454–455map resolution with RSS, 456–457
Fire detection algorithm, 139–140color segmentation, 140ffour-stage algorithm, 140fmoving regions detection, 140f2-level discrete wavelet transform, 141f
Fire detection method, 135background subtraction, 162–163classification, 165–166color segmentation, 163–164, 164f
color variations using spatial waveletanalysis, 164–165
false negatives (FN), 166MATLAB 2012b, 166percentage of FN (PTN), 166percentage of TP (PTP), 166true positives (TP), 166vision based, 136
Fire wall, 536Fire-containing movies, normalized wavelet
energies with, 165fFirewall logs, 844, 851Fisherfaces, 388, 389t, 390fFitt’s law, 616, 620, 622fFixations, 803Flame, 536Floating continuous query (FCQ), 205–206,
209decomposition, 206–207performance evaluation, 207–208processing flow, 207f
Flow filter, 541Flow whitelist, 531, 533fForce intensity, performance intensity, 624,
626–628Ford-Fulkerson Algorithm (FFA), 745Foreign-made log analysis, 844Formants frequency, 633, 636, 638, 639, 640FPGA, 120, 124, 125Fragment retransmission, 172–173FTraction, 690Fuel efficiency model, 248
system flow diagram, 248–251, 249fFuel gauge level, 251fFunctional annotation, 786
data features, 787, 789fnon-binary form, 788Saccharomyces cerevisiae, 787, 788
Functional gene annotation, 786Fuzzy c-means, 194, 394Fuzzy cognitive map (FCM), 338, 340, 341f
detecting emotion colors, 342fFuzzy interference rule, 148Fuzzy logic, 44, 46Fuzzy matching method, 635Fuzzy neural networks (FNNs), 104Fuzzy relation equation-based approach, 111Fuzzy system
for spectrum sensing (see Spectrum sens-ing, fuzzy for)
system model, 146for wavelet denoising, 150
Subject Index 907
Fuzzy variable, 47fFuzzy-based resource reallocation scheduling
model (FRRSM), 44architecture of, 46frule bases, 47t
Fvacuum, 690
GGA-HNN3, 59Gamma value correction, 298Gateway authentication, 81f, 82Gaussian distributed random variable, 747Gaussian noise, 31Gaussian random variable, 146Gaze behavior analysis system, 800, 801
basic gaze data and monitoring results,805, 806f, 807
data compression patterns, 807, 807fexperiment environment, 804–805gaze time and monitoring, 806f, 807object centered (see Object centered gaze
behavior analysis system)object-based gaze behaviors, 808
Gaze data processing process, 804Gaze duration, 803GBSR (Greedy Border Superiority Routing),
752, 753, 754f, 755Gender and skin aging, 262Gene annotation, 786Gene expression, 786Gene ontology (GO), 786, 787, 788, 795–796
dataset reconfiguration, 790error rate applying several methods, 793ferror rate for each term, 794tnegative, 791, 792tpositive, 791, 792t
Generalized reactivity (GR1) formula, 431,432
importance of 433overall processes, 434f
General-purpose microprocessors (GPPs), 136Generic-based back propagation neural net-
work (GBPNN), 136Genetic algorithms (GAs), 329
crossover, 397mutation, 397–398selection, 397
Geometrix FaceVision 200, 429Georeferenced class, 463f
with temporality, 463fGeo-spatial intelligence systems, 71
Gestures, 732drag gesture experiment, 736fkinds of, 734fpoint gesture experiment, 735fpseudo code for movement, 734frecognition, 731recognition rate analysis, 737tscissors gesture experiment, 736fslide gesture experiment, 736f
GLIF, 409Global Distribution System (GDS), 322Global Positioning System (GPS), 248, 441,
506, 516, 673, 674, 675, 765-based location information, 671-based position recognition technology,
670for car parking information, 877signaling channel, 440, 453in traffic information, 741, 744
GMDSS, 545GNSS application, 465, 466GNU R, 844, 851GOA (gene ontology annotation), 787Google Android’s Dalvik VM, 720Google glass, 212, 213GOP structure, 38Gotcha, 787GPSR (Greedy Perimeter Stateless Routing)
protocol, 752, 753greedy forwarding, 753local maximum processing, 753
Graphical Models, 835Graphical-based password techniques, 12Graphics processing units (GPUs), 154, 194
-based Bellman-Ford (BF) algorithm,156–158
-based software paradigm, 154and equivalent CPU-based implementation,
159thardware specification of, 157tmulti-threading arrangement on, 155fover CPU, speedups of, 160f
Gray level co-occurrence matrix (GLCM),179–180
sensitivities of, 182fGreedy forwarding, 753, 754fGreenhouse cultivating environment, 834Group of video coding experts
(VCEG), 271GUI-based situation information processing
technology, 670GUIDE, 409
908 Subject Index
GZTR (Geographical Zone Based Two-tierRouting) algorithm, 755
average hop counts, 760tnext zone selection algorithm, 755–757packet loss rate, 760frelay node selection algorithm, 757–758throughput rate, 759f
HH.264 Scalable Streaming, 310, 311Haar-like feature, 825, 826fHaar-Waveletes, 823Habitat monitoring, 76Hadoop Distributed File System (HDFS), 606Hadoop file system (HDFS: Hadoop Distrib-
uted File System), 556Hadoop platform, 560Hamming + 1 scheme, 700
and Hamming + 3 scheme, 705tand matrix encoding, 705t
Hamming + 3 scheme, 700, 701and Hamming + 1 scheme, 705tand matrix encoding, 705t
Hamming codes, 698–699binary Hamming codes, 6991-error correcting codes, 701
Hand gestures, 616Hard c-means (HCM) clustering, 104, 105,
106, 108Hard disk device (HDD) capacity, 131Hard scatter partition, 112, 117
of LBG algorithm, 116fHard threshold function, 147Hardware-software co-design scheme, 120,
125Harris-Benedict equation, 264HBAE (Host-Based Analysis Engine), 557Henagon shape, 888tHeptagon shape, 888tHexagon shape, 888tHidden Markov model (HMM), 598
ED decision and, 509ftracking, 508, 513tracking errors by, 510f
Hidden pilot sequence, 30Hierarchical task network (HTN), 663High efficiency video coding (HEVC), 271High performance cluster computing (HPCC),
128HIGh security and light weigHT (HIGHT),
227High utility sequential (HUS)
HUS-Span, 55
HUS-Span algorithm, 50pattern mining, 49
High-performance TI DSP, 136High-resolution digital images, 678HMIs (Human Machine Interfaces), 526, 536Homomorphic encryption scheme, 366
algorithm, 368–369performance, 370fpreliminary definitions, 367
Host Discovery, 528, 529tHost-based detection, 577Hounsfield Unit (HU) histogram distribution,
682Huffman coding, 721Huffman decoding, 720Huffman-encoded bytecode, JIT-decompres-
sion of, 720HUINS SoC Master 3 board, 138, 139fHuman visual system (HSV), 39
spatial frequency response of, 40fHuman-computer interaction (HCI), 801Hybrid deduplication scheme, 230Hybrid electric vehicles (HEVs), 708Hybrid method, pixel value’s transition
adoption of curve fitting, 300–301, 301fgetting transition state, 299–300, 300f
Hypo-monocyclic-Coxianrepresentation, 100
II/F filter, 540I2Core System Management Application, 70IaaS, 860IBM data generator, 55, 56fIBM QRader, 555IBS/INS, 545ICCP, 536I-Concatenation operation, 51, 53Iconic stereotypes, 462–463
stereotype set class and, 465fIDC (Internet Data Center), 516Idle, stop, and start (ISS) function, 708IEA, 787IEEE 802.11 MAC, 170
backoff-free fragment retransmissionfragmentation, 172–173
classical fragmentation (CF) scheme, 172classical fragmentation contention
overhead, 172fclassical fragmentation overheads, 172ffragmentation in, 171performance evaluation, 173–175
IEEE 802.11 station (STA), 170
Subject Index 909
IEEE 802.11 wireless local area networks(WLANs), 169
IEEE802.15.4, 495IEEE802.15.4 task group (TG4e), 496IEEE802.15.4e DSME, 496–497
performance evaluations, 497–498topology, 499f
If-then rules, 104Illumination effects, in stereo images, 302f,
303, 303fIMA (Integrated Modular Avionics)
architecture, 415Image content, 799
information detection, 800Image data-per-processing element (IDPE)
variation, 194, 200Image object representation method, 800–801Image processing
hardware tools, 878, 879timage capturing, 878image detection, 880integrated car park management system,
876–877pre-processing, 878–880, 879fsoftware tools, 878, 879ttwit status, 880twitpic image, 880
Image segmentation, 678, 680, 684, 685, 877using Level-set, 679–680, 681f
Image-based automobile detection, 822Implicit Password Authentication System
(IPAS)advantages, 13–14domains, 14experiment, 15–16sample image with implicit objects, 16fsecurity of, 19survey analysis, 17–18survey questions, 16–17usability of, 18–19user test phase, 15
Inactive pixel (IP), 424Incoherent domain, 98Independent component analysis (ICA), 598Induction motor, 177
fault classification of, 178–179IndusCAP-Gate (Industrial Cyber Attack
Prevention Gate) system, 536application, 539farchitecture, 539fprototype platform, 543f
Industrial firewall, design ofarchitecture and application of IndusCAP-
Gate system, 538, 540
implementation and evaluation, 543multiple access control filter based
blocking of unauthorized access,540–543
Information Integration Core (I2Core), 67, 68basic data flow, 71fbenefits of, 73early warning systems, 70–72, 72fearthquake sensor, 73execution concept, 70features, 68, 69fhuman interaction, 71sample execution, 70–73
Information integration, 324Information systems
consumer systems, 68tdata sources, 67t
Information systems integration, 66. See alsoInformation Integration Core (I2Core)
standalone system, problems of, 66–67Information technology (IT), 279Initial contour, 684Initiative service, 324Integrated car park management system, 875
denoise, 880fhardware tools, 878, 879timage processing techniques, 876–877implementation, 878–881limitations, 881low financial entry point, 876pre-prepared mask, 880fsocial media for communication channel,
877software tools, 878, 879t
Integrated log analysis, 847–848design of, 845–846system, 845, 845f
Integrated starter-alternator (ISA), 708Intel Xeon cache, 130fIntel Xeon cores, 130fIntelligent driver assistance system. See
Advanced Driver Assistance System(ADAS)
Intelligent logistics, 675Intelligent robots, 687Intelligent transportation system (ITS), 764INTER mode, 272Interconnect technology, 131Interface and Test Processor (ITP), 88Interior permanent magnet synchronous motor
(IPMSM), 709controller, 710f
International Association of LighthouseAuthorities (IALA), 545
910 Subject Index
Internet data centers (IDCs), 222Internet navigation, 467Internet protocol routing, 154Interoperability standards, 66InterPro (IPR), 786
correlation coefficient among, 793toriginal, 793tweighted IPR, 792, 793t, 794–795
Interpro2go, 787InterProScan, 786Inter-streaming multiprocessors (Inter-SMs),
194Inter-system VTS Exchange Format (IVEF)
protocol, 545INTRA mode, 272Intrinsic (internal) aging factors, 262Intrusion Detection System (IDS), 222, 223,
530Intrusion Prevention System (IPS), 222, 223Inverse Compositional Image Alignment
(ICIA), 427–428Inverse distance weighting (IDW) interpola-
tion, 454, 457Inverse DWT (IDWT), 22, 25IP/MPLS networks, 565I-phone, 254ISO 14649 (STEP-NC), 241, 243ISO26262, 716ISS, 787IT firewall technology, 537IT logistics convergence. See Smart logistics
serviceIVEF (Inter-VTS Exchange Format) Service,
546iWatch, 212IxBD (Interface-BigData) interface, 558IxLBVA (Interface-LB to VA) interface, 558
JJapan Society of Civil Engineering (JSCE),
816, 819PBD, 816, 819structural performance verification of, 816
Java VM (JVM), 720Joint Collaborative Team on Video Coding
(JCT-VC) group, 271Joint substream video model (JSVM) codecs,
309Junk DNA, 22Just in time (JIT)
decoder, 720, 721
decompression, 720Huffman decoding, 720, 722, 728operation model, 128
Kk-anonymity, 366, 367Key escrow, 588Key management methodology
comparison of, 589encapsulation, 588–589key escrow, 588trusted third party (TTP), 589
Keyboard dynamics, 886Keystroke dynamics, 886Key-Value Models, 835KINECT camera, 254, 255, 257, 258Kinect, 616, 732Knowledge encoding method
knowledge authoring method, 411–412in u-health portal, 410, 411–412
Knowledge-based identification, 314Korea Internet & Security Agency (KISA),
606Korea national DNS, 606
deployment status of, 608fstructure of, 607
Korean diphthongs, 637tKorean single vowel
lip shape and tongue’s location of, 638fsingle vowel triangle, 637f
Korean vocal sound system, 634characteristics of, 637vowel vocal sound system, 637
LLagrange multipliers, 180Laplace transform, 99Large-scale data analysis engine, 557–558
feature description, 560ffunctions of, 559tmajor host-based features, 559tstructure of, 558f
Layered streaming scheme, 306LBAE (Large-scale Batch Analysis Engine),
557Leap, 733Level-set, 678
segmentation for body detection, 681fspeed function, 679
Lifting based integer DWT transform, 23
Subject Index 911
Likiwid Performance tools, 726Limit state design, 814, 819Linde-Buzo-Gray (LBG) algorithm, 112
hard partitioned spaces, 116finput-output spaces, 116fmodel outputs, 116fnonlinear process, 113, 114, 117rule generation, 112, 113, 114
Linear inference, 113Linear Predictive Coding (LPC) algorithm,
634Linear regression module, 848Linear temporal logic (LTL), 431, 432
decentralized setting, 433fdecentralized specifications, 432–433
Linguistic modeling, 111Linux background, 444Linux kernel, 579Lip sync solution, 635
block diagram of, 636fin digital contents, 640
Local binary pattern histogram (LBPH), 385,388
Local maximum processing, 753, 754fLocal memory, 195Local overlapping bucket (LOB) scheme, 352Localized Big Data Analysis (LBDA), 606,
608advantage of, 609for big data, 613C&C domain, 611Hadoop installation, 609Map/Reduce of, 611
Location area management, 57Location area planning, 58
solution representation, 59Location Areas (LA), 58Location authentication, 440–441Location mechanism, 442
basic scheme, 442registration phase, 442–443secure scheme, 442supported technology, 443–444
Locationsarea-based coupons, 440–441reliable detection of, 441with no signals, 441
Locking system for security improvement(LSSI), 468
D-manager, 470DB-manager, 470design system of, 468, 470, 469f
DSD, 468IDP-manager, 470implementation of, 470–471initial execution screen, 470finput time, 471fL-service, 470performance evaluation, 471screen upon receiving 10 directions, 471f
Locking system. See Locking system forsecurity improvement (LSSI)
LOD (Linked Open Data), 448life cycle and tools, 450fLOD2, 448
Log authentication systemauthentication processing, 594, 595fdesign of, 592–593OSP system environment, 591role of, 593signature authentication, 595fsystem configuration, 593–594X.509 institutional authentication format,
592fX.509 user authentication format, 592f
Log-chromacity color, normalization of, 298Logic Based Models, 835Look-up tables (LUTs), 142Low density radio map, interpolation of,
510–511Low rate wireless personal communications
(LR-WPAN), 495Low-Cost Airline Service System, 324
booking services, 326computing engine, 325–326real-time information transformation, 325task manager, 325web services, 325
Low-cost airlines (LCA), 322Low-cost carrier (LCC), 322LQS-Tree, 51
and Utility Matrix, 52fLRIT, 545LSAE (Legacy Security event Analysis
Engine), 557Lung segmentation
distribution of variance and area, 683fexperimental results, 685timage segmentation using Level set, 679image segmentation using MRA Level set,
681fMRA Level-set method using auto-config-
uration of the initial contour, 680–684,685f
912 Subject Index
MMAC layer collisions, 4MAC protocol data units (MPDU), 171MAC service data unit (MSDU), 171Machine learning algorithms, 576, 578, 584Machining, 238Macro modeling, 293–295
for TVC circuit, 294ffor VTC circuit, 294f
Magnetic devices, 688Magnetic Resonance Imaging (MRI), 678Maintenance and Test Processor (MTP), 88Malware detection
collection of resource information, 578features for, 579tresource feature for, 579resource information monitoring agent,
580–581, 581fMamdani method, 46Manchester OWL syntax, 242Mandatory Access Control (MAC), 517, 518Mandatory Key Fragment, 378MANET (Mobile Ad-Hoc Network) environ-
ment, 773Many-core architecture, 194, 197, 198MapReduce, 557
abnormal behavior detection method using,560
handling process, 561fSINBAPT, platform specification, 561f
Markers, 254game ‘‘Beyond: two souls’’, 255f
Markup Scheme Models, 835Mass air flow (MAF), 249MATLAB, 764
-based third-party program, 708Matrix encoding, 698
and Hamming + 1 scheme, 705tand Hamming + 3 scheme, 705t
Matrix metalloproteinases (MMPs), 262Matrix module, 848Maximum accessed domain SQL query, 606MB-OFDM UWB systems, 30
network throughput performance, 33f, 34fsimulation parameters, 33tsystem model, 30–31
MCR (Main Control Room), 89MCSO-SVM, 333
classifiers, 333and CSO-SVM, 335tevaluating fitness, 333–334mutation operation, 333solution set design, 333
Mean-variance based method, 680
Medical imaging equipment, 678Medium access control (MAC), 170Mel-frequency cepstral coefficients (MFCC),
393, 634, 635Memory, 131Merkle tree, 230, 234Message authentication code (MAC), 77Message-Locked encryption, 230MiBench embedded benchmark suite, 720Microsoft Foundation Classes (MFC), 662Mile per Gallon (MPG), 248–249Min-Cut Max-Flow Theory, 745MITM, 222Mixture of Motor Primitives (MoMP), 662Mobile administrative services, 474–475
blacklist function, 475whitelist function, 475
Mobile application interface, 324fMobile based pre-order system, 654Mobile cloud computing (MCC), 212Mobile device (MD), 453, 507
ED decision and HMM tracking, 509fmoving device, tracking of, 508moving path of, 509fsimulation results, 508–509tracking errors by EUD, 510ftracking errors by HMM, 510ftracking on real RSS measurements, 509
Mobile device management (MDM), 475,480–481
App management functions of, 481tcomponents of, 477tconfiguration diagram of, 477ffunctional evaluation, 477–478
Mobile internet, 322Mobile malicious code, 475
types of, 476tMobile malware detection trend, 576–577Mobile system
database, 656database design, 656–658server, 656socket programming, 656
Mobile telephony, 96Mobility E-EMS, 224–225
implemented control system, 226fModbus, 526, 536 537
command whitelist, 531, 533fcommands verification, 533DPI Firewall, 537protocol, 526, 528TCP/IP ADU, 527f
Model report module, 848Model-based design (MBD), 708
Subject Index 913
Modified cat swarm optimization method(MCSO), 333
Modified quadratic inference, 113Moment fuel efficiency value, 248Mono-cyclic coxian representation, 100Monoscopic motion mask (MMM), 404Moore’s law, 130, 131Motion activities
motion vector (MV), 273prediction modes, 273t
Motion capture, 254Motion detection, 162Motion recognition, 254, 258Motion sensor. See Attitude Heading Refer-
ence System (AHRS)Motion vector, 38Motion vectors merging (MVM) method, 272Motor-starter-generator (MSG) technology,
708Movement vector, 39Movement-containing region detection
(MCRD), 162–163MCRD, example, 163f
MP4 Scalable Streaming, 310, 311MPEG encoder scheme, 39MPEG-7, 800M-sequence, 38–39Multiband orthogonal frequency division
multiplexing (MB-OFDM), 29Multi-channel EMG, 616Multi-core architecture, 136, 138, 142
discrete wavelet transform on, 141fmoving regions detection, 140freference multi-core architecture, 137, 138synthesis results, 143tsystem parameter, 139tand TI C6146 processor, 143t
Multimedia content management, 393, 399.See also Audio classification; Audiofeatures extraction
Multimodal face recognition. See Facerepresentation
Multi-modal user interfaces, 254–255‘‘Put-That-There’’ controlled systems, 254
Multiple automata, 432Multiple Criteria Decision Making technique,
242Multiple face tracking. See Face labeling
algorithm (FLA)Multiple-access control filter, 542f
processing and policy of, 541fMultiply-accumulator unit (MACC), 196Multi-Resolution Analysis (MRA) Level-set,
678
lung segmentation method using auto-configuration of the social contour,680–684
Mutated codon sequences, BERs of extractedwatermarks in, 26f
MySQL, 557
NNao robot, 662Natural aging process, 262
support vector machine (SVM), 262Natural user eXperience (NUX), 598Natural user interface (NUI), 598, 731Navigation systems, 740NBAE (Network-Based Analysis Engine), 557Nehalem architecture, 722Network allocation vectors (NAV), 171Network attached storage (NAS), 128Network congestion, 3Network games, 468Network interface card (NIC), 540Network layer access control block, 540Network lifetime, 782Network throughput
high transmission power, 362, 363flow transmission power, 362, 363fin interference-free environment, 359–360in signal interference, 360–361
Neural networks, 119New Reno protocol, 2Next Generation Sequencing (NGS), 786Next zone selection, 756f
destination zone, 758ftransmission range, 756f, 758f
Nicotine consumption and skin aging, 262Node energy, 775Non-coding DNA sequence (nCDS), 22Non-fire-containing movies, normalized
wavelet energies with, 165fNon-fuzzy inference systems
consequence identification, 113–114performance evaluation, 114, 115tpremise identification, 112–113
Non-fuzzy neural networks (NFNNs), 104learning algorithm, 105local spaces of, 106, 107foptimization, 106–108, 108fperformance index, 106–107, 107tstructure of, 104–105, 105f
Non-overlapping 7-pixel blocks, 702Nonvolatile memory express (NVMe), 131Normal (NO) fault, 179NoSQL, 557
914 Subject Index
NP-hard problem, 58NUI/NUX framework, 255
hand gesture, 258fhand mouse framework, 256fhand mouse gesture recognition, 255, 257mapping to monitor, 258fmouse area comparison, 257fsystem architecture, 256f
NUI/NUX-based gaming, 598
OOBD car doctor pro, 248OBDdroid scan pro, 248Object centered gaze behavior analysis system
content object representation structure,802–803
gaze data analysis model in real time,803–804
system model structure, 801–802, 802fObject detection, 688, 692, 695
image processing for, 693f, 694fObject Oriented Models, 835OKF (Open Knowledge Foundation), 448On-board diagnostic II (OBD II), 248
parameters, 249tOn-demand instances, 483–484‘‘One computer has one function’’ concept,
415One-dimensional (1D) vibration signals, 178One-time password (OTP), 76One-way hash function, 76, 77, 78, 83Online server development for robot control
interoperability of server, 664–666server protocol for task execution, 666–667task generation, 663–664
Online service providers (OSPs), 587architecture system of, 593f
OntoBLAST, 787Ontologies, 239, 241
model for automatic growth environmentcontrol of crops, 838–839
service based on, 835Open Source Computer Vision Library (Op-
enCV), 662Open Source software, 878OpenCV image processing, 876, 879tOpFake, 584Optical combiners, 97Optical computing, 95Optical digital filter, 96, 101Optical fiber, 96, 98, 101Optical networks, 96, 97Optical processor, 97f
Optical splitters, 97Optimization problems, 330Optional fabric for backup, 128Optional Key Fragments, 378Original continuous query (OCQ), 203
transformation, 205fOutlier analysis module, 848Out-of-bid event, 484Over the Air (OTA) technology, 475OWL technology, 323OWL-DL ontology, 239, 240
PPaaS, 860Packet collection and control block, 538Packet losses, 2Packet Sniffing, 222Pairing Based Cryptography (PBC) library,
190PAMS (Post-Accident Monitoring System), 89Pan coordinator (PC), 495Parabolic-rectangular (p-r) stress-strain curve,
810, 812f, 817Parallel computing, 154Parallel misalignment fault (PMF), 179Parameter estimating module, 848Parameter select module, 848Parent process ID (PPID), 647Particle swarm optimization (PSO), 104, 106,
329Passdoodle system, 13Passfaces system, 13Passwords (locking system), 468Path modification, gesture definition for,
733–734Path planning, 732
with human intervention, 732Patterns (locking system), 468Pay-per-use pricing, 854, 855, 857–858PDA-based logistics/delivery computer sys-
tem, 671PDU-DB Server, 225Peak signal to noise ratio (PSNR), 41, 42,
276t, 277, 405, 703, 705numerical values comparison, 303f, 304
Pellet reasoned, 243Pentagon shape, 888tPentagonal bipyramid, 889tPER (Packet Error Rate), 777Personal cloud, 374Pfam, 787Photo-detector, 97Photonic computing, 95
Subject Index 915
Photonic devices, 96Photonic filters, 97Pig code, 610, 611fPINs (locking system), 468Pipelined microprocessors, 721PIR SuperFamily, 787Pixel-to-vertex map (PVM), 424, 428PKI-based authentication sub-system, 588PLC (Programmable Logic Controller), 89,
526, 537Plot module, 848Poisson distribution, 218Poisson process, 31Policy and alert management block, 540Polygon-based object annotation method, 800Position-control performance model, 622f,
623–624Positive realization, 96, 98–100Positive system, 98, 99, 101Positron Emission Tomography (PET), 678Potential high utility sequence (PHUS), 50Prediction unit (PU), 272Prediction-based travel time, 748tPre-order service, 655PreScan, 764Price history, 484Pricing schemes, 854, 855, 859, 860Principal component analysis (PCA), 598Prints, 787Priority matrix (PS), 566–567, 567t
bridge Id/path Id, 568tcyclic priority matrices, 569–571fairness evaluation, 571–572with 4-bit priority words, 568tproblem definition, 569
Privacy-preserving data collectionalgorithm, 368–369performance, 370fpreliminary definitions, 367
Private LAN, 128Probability Based Improved Broadcasting
algorithm, 775Probability density function (PDF), 32Probe packets, 776Process ID (PID), 647Processing elements (PEs), 136
RTL schematic, 4 9 4 PE array, 142fRTL schematic, single PE, 142f
PRODIGY, 409Prodom, 787Projected-Database Utility (PDU), 50, 54–55PROMELA model, 416
Prosite, 787Protein function, prediction method of,
789–790data reconfiguration using under-sampling,
791fdataset reconfiguration, 790feature selection, 790–792weighted IPR, 792, 794–795
Protein functional site, 786Prototyping system, multi-core
HUINS SoC master 3 board, 140fmulti-core embedded system, 137, 138freference multi-core architecture, 137reference multi-core array, 138fsynthesis results of, 143tsystem parameters, 138–139, 139t
Provable Data Possession (PDP), 186Provider Link State Bridging, 566PSO-SVM, 330Public key cryptography, 77
cluster formation, 80–81Public key infrastructure (PKI), 588Public LAN, 128Pure recall-based technique, 13Python script, 727
QQ-learning algorithm, 598, 604Qplus-653 kernel, 416
accessing mechanism, 421finter-partition communication of, 417–419message transmission in, 419fnon-error-propagation in, 419–420qplus_ports, 420qplus_queue, 420
q-subsequence, 50Quadratic inference, 113Quadrilateral shape, 888tQuantitative sequence database (q-SDB), 50,
53tQuasi-identifier, 368
RR analyzing tool, 607Radar, 822Radial basis function (RBF), 166, 181, 331Radio Map, 454
interpolation, 506Raspberry pi, 876Rational Rose software, 464
916 Subject Index
Reactive routing protocol, 774Reactor protection system (RPS)
architecture, 88of power plants, 90–92of research reactor, 90
Real radio signal propagation, 507Real time lip synchronization, 635Real time memory analysis
delivering evidences and confirmation, 646digital evidence securement and collection,
646investigation and analysis, 647investigation preparation, 645–646memory dump process, 648memory imagification for process, 648process list extraction, 647real time data analysis, 648–650real time data investigation procedure, 647response, 646SNS investigation procedure by, 644–645web browser memory use list, 648, 649f
Real time resource reallocation for betterresource utilization (RTRRBRU),44–45
Real time vowels recognition, 635Real-time data analysis, 557Real-time operating systems (RTOS), 416
ARINC 653 (see ARINC 653 Standard)Qplus-653 kernel (see Qplus-653 kernel)
Recall-based graphical techniques, 12Received signal strength (RSS), 453, 507
map resolution with, 456–457Recognition- based graphical techniques, 12Reduced Sequence Utility (RSU), 50, 53–54Reference many-core processor, 195, 196fRegister-transfer level (RTL), 198Regulatory Guide 5.71, 1.152, 88Relay node selection, 756fReno protocol, 2Re-routing algorithm, 746Residual analysis module, 848Residual energy, 774, 776
variance of, 782–783, 783tResource reallocation algorithm, 45–46Respondent-defined privacy protection
(RDPP), 367RF (RandomForest) classifier, 581
machine learning algorithm, 578performance comparison, 582fperformance indicator, 583t
RFIDs, 203application domain, 461tag and sensor tag application, 204f
RGB color mean figure, 343f
Roads in target area, 748fRobots
adhesion system and impeller, 689fcross development model, 692fdesign and structure, 688–691effective battery duration, 693tembedded image processing system,
691–692existing forces analysis, 691fimage processing and communication, 693fimage processing procedure, 693fimprovements in, 691foverall exterior view of, 690fpayload capacity, 693tposition with payload, 694fspeed in various direction, 693t
Role Based Access Control (RBAC), 517, 519Rotor unbalance fault (RUF), 179Round-Robin scheduling model (RRSM), 46Route error (RERR) message, 4Route reply (RREP) message, 4Routing algorithm, 745. See also Bellman-
Ford distance vector routing algorithmcalculating estimated travel time, 746searching optimal path, 745traffic information modelling, 745
Routing success probability, 783, 783tRREQ message, 775RSA cryptosystem, 38RSSI (Received Signal Strength Indication),
359
SS/Key algorithm, 76
generation of set of passwords, 79fpassword generation phase, 78registration phase, 78
S5PV210 microprocessor, 688Saccades, 803Safe and Saving index (SS-index), 248, 250,
251fSAGE (Standard-based Sharable Active
Guideline Environment), 409SAX parser, 549SCADA (Supervisory control and data acqui-
sition) systems, 525architecture, 526general layout, 527fModbus protocol, 526, 528servers, 536
SCADA Firewall, 537Scalable streaming service, 306Scalance, 537
Subject Index 917
Scan attack, 528, 529tScatter partition, 104, 108Scissors gesture, 733, 734fS-Concatenation operation, 53Script-based learning, 599SDbitmap, 497Secure and adaptive transmission control pro-
tocol (SA-TCP), 2, 3–5security, 5–6simulation, 6–7
Securityaccident time period, 844, 851equipment, 845related infra logs, 844, 851related issues, 843
Security authentication methods, 314Security control system, 222, 223, 227Security function, 468, 469t
DSD, 468Security Information and Event Management
(SIEM), 223–224Security intelligence technology, 554–555Security parameters, 3Security Service Provider (SSP), 378, 379,
380, 381, 382SEED-256, 255
data encryption conversion code, 226fSelf-Adaptive Navigation System (SeNS), 740
comparison of existing systems, 743tdesign, 742, 744–745scenario, 747simulator, 746–747system requirements, 742
Self-adaptive software, 749Self-awareness privacy, 367
protection (see Privacy-preserving datacollection)
Self-enforcing privacy (SEP), 367Semi-digital smart integrated circuit design,
289cyclic type analog-to-digital converter, 289successive approximation (SAR) converter,
290TVC (see Time-to-voltage converter
(TVC))VTC (see Voltage-to-time converter
(VTC))Sensor nodes, 76, 82
authentication by user, 81f, 82–83Sensors, 203, 834Sequence Weighted Utilization (SWU), 49Service models, 854, 860
scenario, 674–675Service process management module, 869
Serviceability limit states, 810Serviceability performance, 810Session hijacking, 2Set Top Box (STB), 307Shadow area detection, 829fShannon theory, 30Shortest path bridging (SPB), 566SIEM (Security Information and Event Man-
agement), 555SIFT descriptors, 506SIFT flow, 424, 425SIFT matching test, 507fSIFT-based building matching, 512Signal coverage, 358, 362Signal interference, 358
to network throughput, 360–361simulation topology, 361tin WiFi networks, 359
Signal to interference plus noise ratio (SINR),30
Signature signal, 38–39generation, block diagram, 39f
Signature-based detection, 576Simple Additive Weighting technique, 242Simple vector filter, 120Simplified inference, 113Simulated annealing, 58
with compact index, 60fSimulated log events, 849fSimulating synthesized automata, 434
arbiter, 434, 435, 436, 437robots, 434, 435, 436, 437screenshot of, 435fsetting of, 435fspecifications of, 436f
Simulationdesign condition for, 714tdriving environment for, 714troad condition for, 714f, 715f
Simulink, 764SINBAPT (Security Intelligence techNology
for Blocking APT), 5557, 58, 562cyber-targeted attack response system, 557fplatform specification, 561f
Single instruction multiple data (SIMD), 194Single vowel recognition, 638, 640tSituation information model for smart logistics
service, 672–674coordinate information, 673
Situation information-based intelligent logis-tics service model, 671–672
SK Communications hacking, 554Skin aging
and alcohol consumption, 265
918 Subject Index
and sleeping, 265Skin hereditary traits
calories and exercise intensity, 266tdata for normalization, 264–265evaluating, 266–267extrinsic aging factors, 263–264skin texture, 263statistical estimation of, 267
Skin texture ages, 262Skin type and skin aging, 262SKIP mode, 272Sliding gesture, 733, 734fSlow start threshold (ssthreshold) value, 4SMART, 787Smart devices, 314, 467, 468, 470
authentication processes, 318face recognition, 315false acceptance rate (FAR), 318false rejection rate (FRR), 318graphical password system, 316key generation mechanism, 316, 317fkey space, 316–318keystroke dynamics-based user authenti-
cation (KDA), 316locking systems, 469fpassword, 315pattern lock, 315PIN, 315security threats in user authentication in,
314–315Smart integrated circuits. See Semi-digital
smart integrated circuit designSmart logistics service, 670
situation information model for, 672–673,673f
structure chart, 672fSmart phone, 467, 575SmartRack device, 222SMO, 769, 790t, 794tSMTP (email), 66Social network service (SNS), 575, 643, 644,
863, 864digital forensic of, 644identification of, 645information collection, 646information related to conversation of, 649process of acquiring, 645searching digital evidence, 651tuse in web browser, 650fuser networking information, 649user, timeline information of, 650
Social Networking Service (SNS), 468Soft threshold function, 147Solar power, 883
SOX act, 128Speaker dependent recognition, 640Spectrum sensing, fuzzy for
membership functions of fuzzy sets, 148fproposed scheme, 147–148, 148fROC curves of, 150f, 151fsimulation results, 150–151wavelet denoising, 147
Speech recognition, 634, 635, 638, 640Speed-limit signs
adjacent pixel, labeling, 123fboundary information extraction, 122–123boundary smoothing, 121–122detection and recognition of, 120–121noise elimination, 121–122performance evaluation, 124–125red-colored ring, boundary recognition,
122, 123fspeed recognition, 124system design, 124, 125f
SPIN model checker, 416Splunk application, 555Spot instances, 483, 484Spot prices, 484Square based pyramid, 889tSRDP, 3Standard for Exchange of Product data
(STEP), 238Stateful packet inspection (SPI), 537Static analysis, 576Statistical prediction engine, 845, 846Statistic-based prediction engine system, 846f
generation, 847, 847fintegrated log analysis, 847–848prediction with regression analysis, 850fprediction with time-series analysis, 850f
Statistics module, 848Statistics-based log analysis, 844Steel stress calculation, algorithm for
computation of steel stress, 811–814crack width formulation, 814–817nonlinear material characteristics of con-
crete, 810–811Steganography, 22, 698, 705, 706Stereo camera, 298Stereo image recording (SIR), 401, 402Stereo images, 302f, 303f
PSNR numerical values’ comparison, 303fStereo matching, 297Stereoscopic watermarking, 402Stereotype creator, 463–464, 464f
configuration file, 464, 465fupdate registry information, 464
ST-FeatCAPP, 238
Subject Index 919
Storage area network (SAN), 128, 131Storage bounded continuous queries (SBCQ),
204–205, 206update algorithm, 208f
Strain and bond stress distribution of tensionmembers, 815f
Streaming video, intermediate node for, 307Strength limit states, 810Stresses in steel, 810String topology, 7Structural limit states, 809–810Stuxnet, 536Subscription pricing, 854, 855, 856–857Sub-task table, 599, 600t, 603t
sub-tasks by virtual agent, 602fSubtractive clustering method, 194–195
evaluation metrics, 198, 199texecution time of, 199–200MR images, 199fparallel implementation of, 196–198parameters for, 196tPE configurations, 199tPE configurations for MR images, 200fprocess computing first potential value,
197fsystem utilization, 198, 200f
Suction-based adhesion system, 689Sudden acceleration (SA), 250Sugeno-Takagi models, 112Superframe duration (SD) index table, 496
selection criteria, 498Superframe, 496Support vector machines (SVMs), 165, 262,
330–331, 790t, 823data classification using, 578fmalware detection via, 577–578in measuring skin aging, 262optimal hyperplane, 331fRF (RandomForest) machine learning
algorithm, 578Support vector regression (SVR), 180–181SWISS-PROT, 787, 788, 796SYN flooding, 2Synopsys design compiler, 198System info module, 848System on Chip (SoC) integration, 129System whitelist, 531
TT Map, 741Tablet PC, 254, 314, 315
Tahoe protocol, 2Taint analysis, 576, 577. See also Dynamic
analysis-based detectionTask scheduling, 212, 213, 216, 219Task success probability table, 600t, 601
through Q-learning, 602Task-Role Based Access Control (T-RBAC),
517, 520TCP New Reno, 3, 4TCP/IP session analysis, 537Test simulation module, 848Texture patterns, 179Thayer’s emotion model, 339–340, 340f, 341Thick clients, 211Thin clients, 211Thin-thick clients, 212, 213, 217, 219Third-party auditor (TPA), 186Threshold cryptography technique, 3Tick Tock, 129TIGRFams, 787Time division multiple access (TDMA)
scheduling, 33Time-frequency code (TFC), 30Time-to-voltage converter (TVC), 290
circuit implementation of, 291fCMOS switch, 294error analysis of, 290–293error performance of, 292–293macro models for, 294f
TinyVM, 720, 721Tolerance level, 890TOMTOM, 741Torque assist systems (TASs), 708–709
complete ASM block layout for, 709fconfiguration of an HEV for, 709fefficiency map, 713felectrical parts, 709–710engine, 710–711, 711fintegrated controller, 711–712, 712f
Torque Pro, 248Touch screen, 468, 470, 472, 616Tracking faces, 383Traffic information
generate and collect, 741infrastructure for generate and collect,
740–741interactions among components, 744fproviding service, 741–742
Transfer control protocol/internet protocol(TCP/IP), 662
Transform unit (TU), 272Transformed continuous query (TCQ), 204
920 Subject Index
Translation-rotation matrix, 766Transmission control protocol (TCP), 2Tree pruning algorithm, 272Trial-and-error method, 810Triangle shape, 888tTrOASIS, 741, 742Trusted Software Monitor (TSM) system
authentication protocol phase, 283authorization protocol phase, 283–284authorization, 281efficiency, 285thome authentication server (TSMH), 286registration protocol phase, 283security, 285tsecurity requirements, 280–281system symbol, 282ticket renewal protocol, 284ticket renewal protocol diagram, 282fticketing method, 281–282TSMH authentication message, 286f
Trusted third party (TTP), 347, 589Tweet message, 881fTwit status, 880Twitpic image, 880Twitter micro-blogging, 876, 877Two-dimensional PE array, 195Two-part tariff, 854, 855, 858–859
UUbiquitous computing, 358Ubiquitous wireless networks, 289, 363 See
also Wireless fidelity (Wi-Fi)u-health portal service, 410
application case and evaluation, 412–413guideline for time-related knowledge,
410–411knowledge authoring method, 411–412model connected to CDS, 411system architecture for, 412
Ultimate limit states, 810Ultrasound, 678Ultra-wideband (UWB) devices, 29, 31Unauthorized access, 538, 540
multiple access control filter based block-ing of, 540–542, 543, 544
Unified modeling language (UML), 461Universal Description, Discovery and Inte-
gration (UDDI), 869Updater module, 848User authentication, 79–80
analysis in smart devices, 315–316biometric-based identification, 314components comparison, 84t
guessing attack, 83impersonation attack, 83replay attack, 83rhythm-based authentication scheme,
316–317in smart devices, 315stolen-verifier attack, 83transmission comparison, 84t
User datagram protocol (UDP) communica-tion, 662
User’s behavior analysis, 800User-centric Security Service Model (USSM),
374, 375, 378data storage protocol, 378–379, 378fdata usage protocol, 379–380, 380frequirements of, 375
USpan, 50UV exposure and skin aging, 262, 266UWB-WPAN, 31
VVacuum suction techniques, 688VANET (Vehicular Ad-hoc Network), 751
GZTR Protocol (see GZTR (GeographicalZone Based Two-tier Routing)algorithm)
routing, problems of, 752fVapnik-Chervonekis dimensional space, 331Variables transform module, 848Vehicle, 247–248
fuel used in, 251safety, 763speed (VSS), 249
Vehicle study research, 824tdetection and tracking schemes, 824tdetection and verification, 824false positive, 829, 830ftest video environments, 830ftest video results, 830ftrue positive, 829, 830f
Vehicle surroundings monitoring systemanalysis model for, 764–765block diagram of, 765fmechanism of, 765–768principles of, 766fsafe distance secured by AEBS, 770fsimulation scenario, 768, 769fverification of, 768–769warning zone and relative angle, 767fwarning zone changes in simulation, 770f
Vehicle-to-infrastructure (V2I) communica-tion, 754
Vehicle-to-vehicle (V2V) communication, 754
Subject Index 921
Vehicular tracking, 76Verilog HDL, 141Vertical farm, 835, 839
context-aware control service, 835–837controlled environmental data, 837controlled target, 838tinference rule, 840
VESSEL segmentation in the Lung 2012(VESSEL12), 684
Vessel traffic service (VTS), 545memory usage, 547–548, 549fmemory usage, comparison, 548performance time, on Android, 548fperformance time, on PC, 547, 548fpull-based parsers, 547push-based parsers, 547XML parser in, 546–547
VESSEL12 DB, 684Video contents annotation, 800Video processing technologies, 162Video source, 799Video watermarking. See DIBR video
watermarkingVirtual agent learning processes, 599, 600f,
601learning objectives, 6023D models of virtual agent, 603f
Virtual desktop infrastructure (VDI) applica-tions, 128
Virtual human learning processes, 599, 600f,600–601
3D models of virtual human, 603fVirtual machines (VMs), 719
codeword sequences, 724, 725fdecoder mechanism, 723decoding time and preloaded branches,
725findirect branches, 723instruction pointer (IP), 722and Latendresse’s algorithm, 726and Mibench benchmark suite, 727fspeedup of, 727f
Virtual Private Network (VPN), 222Visual C#.Net, 817Voice recognitions, 635–636Voltage-to-time converter (VTC), 290
circuit implementation of, 291fCMOS switch, 295error analysis of, 290–293error performance of, 293macro models for, 294f
Voronoi diagram, 31Voronoi tessellation, interpolation, 454, 457Vowel recognition processing strategy,
638–640
WW3C standard, 240Wall climbing intelligent mobile, 689fWar walking/driving/carting, 222Watermark embedding on DWT domain, 24fWavelet decomposition (WD), 162, 167, 178Wavelet denoising scheme, 147–148Wavelet transform, 146, 147, 149WAZE, 740Wearable device, 616Weather-proof housing, 883Web Ontology Language (OWL), 239Web Ontology Language service (OWL-S),
663Web search, 575Web Service Definition Language (WSDL),
869Web Services, 66Web-hard system, 593fWeighted Information Fragmenting Scheme
(WIFS), 374, 376algorithm proof, 377defragmentation process of, 377fragmentation process of, 376–377
Whitelist security technology, 476–477components of, 477tconfiguration diagram of, 477f
Whitelists, 531Wireless ad hoc networks (WANETs), 2Wireless communication technology, 834Wireless connection, 306, 310, 311Wireless devices, 440, 442Wireless fidelity (Wi-Fi), 248
-based indoor localization techniques, 453-based localization, 506connectivity, 883direct, 444networks, 358peer-to-peer (P2P), 444routers and access points, 444tethering, 444
Wireless Local Area Network (WLAN), 359Wireless personal area networks (WPANs), 29Wireless sensor networks (WSNs), 76With Coffee application, 655
922 Subject Index
Workflow scheduling algorithm, 484, 485,488f
considering task processing rate, 485cost, comparison of, 493ffailure time, comparison of, 491finitial workflow function, 488fmapping relation of workflows and
instances, 486frecalculation operation of assigned task,
486frecalculation point of task size, 486frecalculation workflow function, 488fresource types, information, 489trollback time, comparison of, 492fsimulation, parameters and values for, 489ftotal execution time, comparison, 490f
XXmlPullParser-based library, 546XMPP (chat), 66XOR operation, 39X-Ray, 678
YYCbCr color space, 163, 164, 167
Zz-axis motion mask (ZMM), 404Zero-crossing rate, 393Zone and conduit model, concept of, 536Zone based routing, 752
Subject Index 923