Future Generation Information Technology: Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $104.08
Usually ships in 1-2 business days
(Save 34%)
Other sellers (Paperback)
  • All (8) from $104.08   
  • New (6) from $104.08   
  • Used (2) from $158.99   

More About This Textbook


This book comprises selected papers of the Second International Conference on Future Generation Information Technology, FGIT 2010, in Jeju Island, Korea, in December 2010.
The 60 full papers presented together with 6 keynote presentations were carefully reviewed and selected from 1630 submissions and were selected from the following eight conferences: ASEA 2010 : International Conference on Advanced Software Engineering & Its Applications, BSBT 2010 : International Conference on Bio-Science and Bio-Technology, CA 2010 : International Conference on Control and Automation, DRBC 2010 : International Conference on Disaster Recovery and Business Continuity, DTA 2010 : International Conference on Database Theory and Application, FGCN 2010 : International Conference on Future Generation Communication and Networking, GDC 2010 : International Conference on Grid and Distributed Computing, MulGraB 2010: International Conference on Multimedia, Computer Graphics and Broadcasting, SecTech 2010 : International Conference on Security Technology, SIP 2010 : International Conference on Signal Processing, Image Processing and Pattern Recognition, UNESST 2010 : International Conference on u- and e- Service, Science and Technology.

Read More Show Less

Product Details

Table of Contents

Keynote and Plenary Papers.- Wavelet-Chaos-Neural Network Models for EEG-Based Diagnosis of Neurological Disorders.- An Introduction to Perception Based Computing.- Social Networks: Research and Applications.- The Roadmap for Sharing Electronic Health Records: The Emerging Ubiquity and Cloud Computing Trends.- Compound Analytics of Compound Data within RDBMS Framework – Infobright’s Perspective.- From Grid Computing to Cloud Computing: Experiences on Virtualization Technology.- Data Analysis, Data Processing, Advanced Computation Models.- Recursive Queries Using Object Relational Mapping.- Agent Based Ontology Driven Virtual Meeting Assistant.- Topic Number Estimation by Consensus Soft Clustering with NMF.- Infrastructure Aided Privacy Preserving-Authentication in VANETs.- Computational Analysis of a Power Distribution System with Petri Nets.- Analysis of Effect of Different Factors on Burst Dropping Probability in Optical Burst Switching Network.- An Optimization of Fundamental Frequency and Length of Syllables for Rule-Based Speech Synthesis.- Grid Smoothing for Image Enhancement.- Suppressing False Nagatives in Skin Segmentation.- Steady State Analysis of an Energy Efficient Mobility Management Scheme in IP-Based Wireless Networks.- Performance Comparison of Handoff Modes in Terms of Energy.- Energy Efficient Coexistence of WiFi and WiMAX Systems Sharing Frequency Band.- IP Mobility Performance Enhancement Using Link-Layer Prediction.- Header Compression for Resource and Energy Efficient IP over Tactical Data Link.- A Frequency-Based Algorithm for Workflow Outlier Mining.- A Framework to Describe and Search for Virtual Resource Objects.- Developer Toolkit for Embedded Fuzzy System Based on E-Fuzz.- A Quadsection Algorithm for Grammar-Based Image Compression.- Effective Storage Structure for Multi-version XML Documents.- An Ontology-Based Platform for Scientific Writing and Publishing.- Multi-facade and Ubiquitous Web Navigation and Access through Embedded Semantics.- New Format and Framework for Managing Scientific Knowledge.- A General Bayesian Network-Assisted Ensemble System for Context Prediction: An Emphasis on Location Prediction.- Bayesian Network Approach to Predict Mobile Churn Motivations: Emphasis on General Bayesian Network, Markov Blanket, and What-If Simulation.- Logical Mechanism for Allocating Resources to Exploitation and Exploration to Achieve Ambidexterity: Team Level Analysis.- Analyzing Economic Impact of Disruptive Technology Using Multi-Agent Simulation: Smart Payment Case.- Research on Mobile Payment Technology and Business Models in China under e-Commerce Environment.- Fusion of Gaussian Mixture Densities for Face and Ear Biometrics Using Support Vector Machines.- Benchmarking Query Complexity between RDB and OWL.- FEDTIC: A Security Design for Embedded Systems with Insecure External Memory.- Security, Software Engineering, Communication and Networking.- Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation.- End-to-End Security Methods for UDT Data Transmissions.- Evading Virus Detection Using Code Obfuscation.- High Flexible Sanitizing Signature Scheme Based on Bilinear Maps.- An Access Control Framework of Federated IPTV Providers for Mobile IPTV Services.- A Novel Scheme for PMIPv6 Based Wireless Sensor Network.- Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model.- A Privacy Preserving Service Broker Architecture for Data Sharing.- Checking the Paths to Identify Mutant Application on Embedded Systems.- Enhanced Sinkhole System by Improving Post-processing Mechanism.- A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot Response.- Real Time Watermarking and Encryption Method for DMB Contents Protection.- A Study on Data Transmission Performance of Sensor Networks for Livesk Feedlot.- Development of an MPEG-4 Scene Converter for Rich Media Services in Mobile Environments.- Dynamic Profiling for Efficiency Searching System in Distributed Computing.- Evaluating the Intention to Use the Use Case Precedence Diagram in Software Development Projects.- A Simple Method Using Multi-Core and Multiple GbE Ports for Improving Parallel Performance in Commodity PC Cluster.- Proposal for Sophisticated Periodic Execution Control in Embedded Systems.- Videogames and Virtual Reality as Effective Edutainment Tools.- An SMS Spam Filtering System Using Support Vector Machine.- Telecommunications User Behaviors Analysis Based on Fuzzy C-Means Clustering.- Performance Evaluation of a Hybrid TOA/AOA Based IR-UWB Positioning System.- All-Optical RZ-to-NRZ Converted Data Transmission at 10 Gb/s.- Improved Location Aided Cluster Based Routing Prool for GPS Enabled Manets.- State of the Art in Wireless Sensor Networks Operating Systems: A Survey.- A Study on the Implementation of Pigpen Management System Using Wireless Sensor Networks.- A Study on Energy Efficient MAC Prool of Wireless Sensor Network for Ubiquitous Agriculture.- Design and Implementation of Wireless Sensor Networks Based Paprika Green House System.- A Smart Service Model Using Smart Devices.- An Implementation of the Salt-Farm Monitoring System Using Wireless Sensor Network.- Mobile Business Agents Model and Architecture.- Implementation of Greenhouse Monitoring System Using Ubiquitous Sensor Networks Based on WMN.- A Study of the Energy Efficient MAC Prool Apply to Ubiquitous Livesk Farming.- Design and Implementation of Middleware for GreenHouse Based on Ubiquitous Sensor Network.- A Context-Aware Streaming Agent Method for Optimal Seamless Service in a Vertical Handover Environment.- A Message Priority Routing Prool for Delay Tolerant Networks (DTN) in Disaster Areas.- A Queue Management Algorithm for QoS Provisioning in WMSN.- Keynote and Plenary Papers (Continued).- OLAP Data Cube Compression Techniques: A Ten-Year-Long History.

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted June 17, 2013

    WOW... I love MyDeals247 model - they create competition among t

    WOW... I love MyDeals247 model - they create competition among the sellers real-time.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)