Skip to main content
  • Conference proceedings
  • © 2015

Information Science and Applications

Editors:

  • Offers the latest research relating to technical convergence in information and security technology
  • Emerging technologies described in detail and illustrated through case studies
  • Contains academic and industrial contributions on information science and technical convergence
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Electrical Engineering (LNEE, volume 339)

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (133 papers)

  1. .

    1. Revised P2P Data Sharing Scheme over Distributed Cloud Networks

      • Wonhyuk Lee, TaeYeon Kim, Seungae Kang, HyunCheol Kim
      Pages 165-171
    2. A Virtualization and Management Architecture of Micro-Datacenter

      • Byungyeon Park, Wonhyuk Lee, TaeYeon Kim, HyunCheol Kim
      Pages 181-187
    3. Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks

      • Baidaa Hamza Khudayer, Mohammed M. Kadhum, Wan Tat Chee
      Pages 189-204
    4. Passive Network Monitoring using REAMS

      • Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel
      Pages 205-215
    5. Low Latency Video Transmission Device

      • Chanho Park, Hagyoung Kim
      Pages 217-222
  2. .

    1. Front Matter

      Pages 223-223
    2. Comparative Investigation of Medical Contents using Desktop and Tabletop Technologies

      • Tahir Mustafa Madni, Yunus Nayan, Suziah Sulaiman, Muhammad Tahir
      Pages 225-233
    3. An Algorithm for Rock Pore Image Segmentation

      • Zhang Jiqun, Hu Chungjin, Liu Xin, He Dongmei, Li Hua
      Pages 243-250
    4. Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences

      • Guoliang LU, Yiqi ZHOU, Xueyong LI, Chen LV
      Pages 251-258
    5. Flight Simulator for Serious Gaming

      • Aruni Nisansala, Maheshya Weerasinghe, G. K. A. Dias, Damitha Sandaruwan, Chamath Keppitiyagama, Nihal Kodikara et al.
      Pages 267-277
    6. Efficient Motion Estimation Algorithms for HEVC/H.265 Video Coding

      • Edward Jaja, Zaid Omar, Ab Al-Hadi Ab Rahman, Muhammad Mun’im Zabidi
      Pages 287-294
    7. A Synthesis of 2D Mammographic Image Using Super- Resolution Technique: A Phantom Study

      • Surangkana Kantharak, Thanarat H. Chalidabhongse, Jenjeera Prueksadee
      Pages 295-302
    8. Using complex events to represent domain concepts in graphs

      • Riley T Perry, Cat Kutay, Fethi Rabhi
      Pages 303-311
    9. Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model

      • Dong Hyun Kim, Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim
      Pages 313-318

About this book

This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.  It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.   The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques.  Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security.

The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology. 

Editors and Affiliations

  • Department of Convergence Security, Kyonggi University, Institute of Creative Advanced Technology, Science and Engineering, Kyonggi-do, Korea, Republic of (South Korea)

    Kuinam J. Kim

About the editor

Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.

His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. 

He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is  Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).

Bibliographic Information

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access