{"title":"Data Understanding Techniques for Management Application and Cryptography","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/INCoS.2016.102","DOIUrl":"https://doi.org/10.1109/INCoS.2016.102","url":null,"abstract":"In this paper will be described the way of using data understanding techniques for semantic information extraction and data meaning evaluation. Extracted information may be then used for performing some management tasks and security actions. It may play important role in advanced secure management applications and intelligent access control to secure data. Such techniques allow extending security procedures and have a great influence for creation new areas of security like personalized cryptography.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Exploratory Analysis Modeling to Study the Correlation between EEG Signal and Respiratory Rhythm","authors":"Xuan Guo, Yixiao Sun, Zhiting Xiao, Wenhui Wu","doi":"10.1109/INCoS.2016.29","DOIUrl":"https://doi.org/10.1109/INCoS.2016.29","url":null,"abstract":"In order to verify whether there is a correlation between human behavior and EEG signal, proposes a method based on exploratory analysis to study the relationship between human behavior and EEG. Through the acquisition of mice EEG and respiratory signal under sleep state, using exploratory analysis modeling to construct a transmission system of the linear time invariant multi-resolution model, then aggregate and disaggregate the respiratory signal. Through the analysis of EEG signals in time domain and frequency domain, experiments show that the EEG signal can control respiration and respiratory signal can also affect EEG rhythms, EEG rhythm and respiratory signals is relevant.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Author Evaluation Based on H-Index and Citation Response","authors":"M. Kudelka, J. Platoš, P. Krömer","doi":"10.1109/INCoS.2016.100","DOIUrl":"https://doi.org/10.1109/INCoS.2016.100","url":null,"abstract":"An accurate and fair assessment of the efficiency and impact of scientific work is, despite a lot of recent research effort, still an open problem. The measurement of quality and success of individual scientists and research groups can be approached from many different directions, none of which is universal. A reason for this is inherently different behavior of different scientists within the global research community. A complex evaluation of ones publication activities requires a careful consideration of a wide variety of factors. The well-known H-index is one of the most used bibliometric indices. Despite its many imperfections, its simplicity and ease of interpretation make it a popular scientometric method. This paper uses the ideas behind the H-index to analyze communities of authors who cite publishing scientists. A new author evaluation measure named aH-indexis proposed, and intuitive interpretations of its properties and semantics are presented. Preliminary experiments with authors with high H-index active in the area of computer science are presented to demonstrate the properties of the proposed measure.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124179126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Secure Architecture for the Internet of Things","authors":"J. Qian, He Xu, Peng Li","doi":"10.1109/INCoS.2016.36","DOIUrl":"https://doi.org/10.1109/INCoS.2016.36","url":null,"abstract":"The \"Internet of Things\"(IoT) opens opportunities for devices and softwares to share information on an unprecedented scale. However, such a large interconnected network poses new challenges to system developers and users. In this article, we propose a layered architecture of IoT system. Using this model, we try to identify and assess each layer's challenges. We also discuss several existing technologies that can be used make this architecture secure.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certificateless Multi-signcryption Scheme in Standard Model","authors":"Wu Xu-guang, Zhang Minqing, Zhu Shuaishuai","doi":"10.1504/ijguc.2018.091718","DOIUrl":"https://doi.org/10.1504/ijguc.2018.091718","url":null,"abstract":"A signcryption scheme can realize the security objectives of confidentiality and integrity simultaneously, which has lower computational cost and communication overhead than the sign-then-encrypt approach. To adapt multi-user settings and solve key escrow problem of ID-based multi-signcryption schemes, we defined the formal model of certificatless multi-signcryption scheme and proposed a certificateless multi-signcryption scheme in the standard model. The scheme can be proven secure without random oracles, and performance analysis shows that the proposed scheme is efficient.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115643051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}