Studies in Computational Intelligence 788 Editor Roger Lee Applied Computing and Information Technology Studies in Computational Intelligence Volume 788 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. More information about this series at http://www.springer.com/series/7092 Roger Lee Editor Applied Computing and Information Technology 123 Editor RogerLee Software Engineering andInformation TechnologyInstitute Central Michigan University Mount Pleasant,MI, USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN978-3-319-98369-1 ISBN978-3-319-98370-7 (eBook) https://doi.org/10.1007/978-3-319-98370-7 LibraryofCongressControlNumber:2018950533 ©SpringerNatureSwitzerlandAG2019 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors, and the editorsare safeto assume that the adviceand informationin this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The purpose of the 6th International Conference on Applied Computing and Information Technology (ACIT 2018) held on June 13–15, 2018, in Kunming, China,wastotogetherresearchers,scientists,engineers,industrypractitioners,and students to discuss, encourage, and exchange new ideas, research results, and experiencesonallaspectsofappliedcomputersandinformationtechnology,andto discuss the practical challenges encountered along the way and the solutions adoptedtosolve them. Theconferenceorganizers haveselectedthebest 13papers from those papers accepted for presentation at the conference in order to publish theminthisvolume.Thepaperswerechosenbasedonreviewscoressubmittedby members of the program committee and underwent further rigorous rounds of review. In chapter 1, Soo-Yeon Yoon, Yang-Ha Chun, Jong-Bae Kim conducted a server to verify the relationship between quality factors, expected value, and edu- cational satisfaction of NCS education system for university students. The study suggestedimplicationsforthesatisfactionofthevaluesandeducationalsatisfaction of the students in terms of educational service quality provided by the NCS edu- cation system. In chapter 2, Veiga Yamodo Marland and Haeng-Kon Kim present a way to simplify the creation of applications for mobile platforms by developing a high-level and platform-independent model of an application, and automatically transforming this high-level model to platform-specific code. In chapter 3, Mechelle Grace Zaragoza, Haeng-Kon Kim, and Ha Jin Hwang present a study that shows how mobile learning can transform the delivery of education and training. This study is timely because there is significant growth in theuseofmobiletechnologybypeoplearoundtheworld,especiallyindeveloping countries. In chapter 4, Symphorien Karl Yoki Donzia, Hyun Yeo, and Haeng-Kon Kim present a study that includes the expansion of rice management scales, including human resources, water and agricultural land; response strategies to irrigation during the drought; and the application of several agricultural water resources. Finally,itpresentsaarchitectureforIoTagricultureservicesbasedoncloudsensor v vi Foreword infrastructure. Their results show that rice should be planted in lowland rice pro- duction systems in Central Africa. Inchapter5,KiljaeAhn,Dae-SikKo,andSang-HoonGimintroducethemixed reality development in architectural design and construction business and suggest design collaboration service platform composed of mixed reality service server, whichisaWebservicesystemforauthoringandmanagingmixedrealitycontents, and terminal application that implements it in mixed reality environment. In chapter 6, Donghyuk Jo presents a study of the information communication technologyintendedtosuggestDefenseInformationSystem(C4I)successmodelto improve the operational performance of the C4I system and to empirically verify the model. Inchapter7,LamyaAlqaydi,ChanYeobYeun,andErnestoDamianiprovidean overview of the landscape of vulnerabilities relatingto SSL/TLSprotocol versions withestimatedrisklevels.Selectingthebestconfigurationforagivenusecaseisa time-consuming task, and testing a given configuration of a server for all known vulnerabilities is also difficult. In chapter 8, Jeong Hoon Shin and Hyo Won Jeon analyze the patterns of variationofthecerebralactivationstatus,dependingonbloodtypes,inresponseto external stimulation. The results of this study would provide the basis for classi- fication of subjects, which is necessary for the selection of effective auditory stimulantsoundsourcesintheprocessofneurofeedbacktherapy/training,inducing the users to modify their own brain waves for healing, and would also present the measures for the selection of efficient visual and auditory stimuli. Inchapter9,Kyung-JinJung,Jung-BoemPark,NhuQuynhPhan,ChenBo,and Gwang-yong Gim present research that seeks to figure how characteristics among countries respond to the intention of usage for cryptocurrencies by comparing Korea, China, and Vietnam. In chapter 10, Ki-Seob Hong, Hyo-Bin Kim, Dong-Hyun Kim, and Jung-Taek Seo present a study that suggests a technology that can detect attacks exhibiting a replaypatternagainstICS,usingwhitelist-baseddetectionandmachinelearningto educate control traffic and apply the results to actual detection. Inchapter11,BenedictoB.BaliloJr.,BobbyD.Gerardo,andYungcheolByun present the new algorithm based on mixed technique by substituting reverse scheme, swapping, and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation. In chapter 12, Eric Goold, Sean O’Neill, and Gongzhu Hu proposed a new clustering algorithm, called reciprocating link hierarchical clustering, which con- siders the neighborhood of the points in the data set in term of their reciprocating affinity, while accommodating the agglomerative hierarchical clustering paradigm. Inchapter13,MechelleGraceZaragozaandHaeng-KonKimdevelopanInfant CareSystemApplication.Theydiscusstwomaintopics:thefirsttopicisrelatedto SIDS vulnerability, to better understand the role of learning during sleep in pro- moting infant survival; the second one related the importance of making sure that Foreword vii infants are given the comfort they need in order to continuously sleep without disturbing the guardians. It isour sincere hope that this volume provides stimulation and inspiration, and that it will be used as a foundation for works to come. July 2018 Takaaki Goto Contents Factors Affecting Satisfaction of NCS Based Educational System . . . . . 1 Soo-Yeon Yoon, Yang-Ha Chun, and Jong-Bae Kim Model-Driven Development of Mobile Applications Allowing Role-Driven Variants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Veiga Yamodo Marland and Haeng-Kon Kim E-Learning Adaptation and Mobile Learning for Education . . . . . . . . . 27 Mechelle Grace Zaragoza, Haeng-Kon Kim, and Ha Jin Hwang Design and Evaluation of Soil pH IoT Sensor Attribute for Rice Agriculture in Central Africa. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Symphorien Karl Yoki Donzia, Hyun Yeo, and Haeng-Kon Kim A Study on the Architecture of Mixed Reality Application for Architectural Design Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . 48 Kiljae Ahn, Dae-Sik Ko, and Sang-Hoon Gim Exploring the Improvement of the Defense Information System . . . . . . 62 Donghyuk Jo A Modern Solution for Identifying, Monitoring, and Selecting Configurations for SSL/TLS Deployment. . . . . . . . . . . . . . . . . . . . . . . . 78 Lamya Alqaydi, Chan Yeob Yeun, and Ernesto Damiani AnalysesofCharacteristics ofChangesin Cerebral ActivationStatus, Depending on Blood Types, in Response to Auditory Stimulation . . . . . 89 Jeong Hoon Shin and Hyo Won Jeon An International Comparative Study on the Intension to Using Crypto-Currency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Kyung-Jin Jung, Jung-Boem Park, Nhu Quynh Phan, Chen Bo, and Gwang-yong Gim ix x Contents Detection of Replay Attack Traffic in ICS Network . . . . . . . . . . . . . . . . 124 Ki-Seob Hong, Hyo-Bin Kim, Dong-Hyun Kim, and Jung-Taek Seo CipherBit192: Encryption Technique for Securing Data . . . . . . . . . . . . 137 Benedicto B. Balilo Jr., Bobby D. Gerardo, and Yungcheol Byun Reciprocating Link Hierarchical Clustering. . . . . . . . . . . . . . . . . . . . . . 149 Eric Goold, Sean O’Neill, and Gongzhu Hu Development of Infant Care System Application . . . . . . . . . . . . . . . . . . 166 Mechelle Grace Zaragoza and Haeng-Kon Kim Author Index.. .... .... .... ..... .... .... .... .... .... ..... .... 175