2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Measurement of edge detection algorithms in clean and noisy environment 清洁和噪声环境下的测量边缘检测算法
Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi
{"title":"Measurement of edge detection algorithms in clean and noisy environment","authors":"Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi","doi":"10.1109/ICAICT.2014.7035954","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035954","url":null,"abstract":"The subject of identification edge in images has a wide application in various fields for that it's considered one of the important topics in a digital image processing. There are many algorithms to detect the edge in images, but the performance of these algorithms depends on the type of image, the environment of the image and the threshold value of the edge algorithm. The objective of this paper is to evaluate five algorithms of edge detection which are Roberts, Sobel, Prewitt, LOG, and Canny in multi environments clean and noisy by using several types of original images (binary image, graphic image, high frequency image, low frequency image, median frequency image, and texture image) and then determine the best algorithm. In noisy environment the following noises was used Gaussian, salt and pepper and speckle. It's known that each edge detection algorithm has a threshold value, if the current pixel value is less than the defined threshold in strength, it will be considered an edge pixel. The change rate of the threshold value in all environments is also explained through this study.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Software implementation of the nonpositional cryptography algorithms 非位置密码算法的软件实现
R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva
{"title":"Software implementation of the nonpositional cryptography algorithms","authors":"R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva","doi":"10.1109/ICAICT.2014.7035908","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035908","url":null,"abstract":"The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of diversity method for reliability of cloud computing 分集方法在云计算可靠性中的应用
S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov
{"title":"Application of diversity method for reliability of cloud computing","authors":"S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035955","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035955","url":null,"abstract":"The aim of the project is creation of methods increasing software reliability and fault tolerance in the cloud based systems. The aim to deliver a comprehensive framework for a substantial, cost-effective improvement in the dependability of application software run in the cloud, beyond the levels offered currently and in the foreseeable future by off-the-shelf (OTS) software products. This improvement will be achieved by using diverse redundancy in an innovative dynamic architecture.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Development of a hybrid web application firewall to prevent web based attacks 开发混合web应用防火墙,防止基于web的攻击
Adem Tekerek, Cemal Gemci, O. F. Bay
{"title":"Development of a hybrid web application firewall to prevent web based attacks","authors":"Adem Tekerek, Cemal Gemci, O. F. Bay","doi":"10.1109/ICAICT.2014.7035910","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035910","url":null,"abstract":"Firewall and intrusion detection systems are used by the purposes of preventing information loss and weakness on internet and providing security for web applications. However attacks to web applications do not only come from network layer. Web applications use Hyper Text Transfer Protocol (HTTP) and attacks come from this protocol to web pages. Tools used for providing security on network layer become inefficient for HTTP attacks. These attacks to web applications can be prevented by detection of HTTP. In this study, a hybrid web application firewall is developed by using proposed signature based detection and anomaly detection methods, to prevent attacks by detection of HTTP requests.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation of education in the field of database systems and technologies within the study programs of economic and managerial focus 在经济和管理重点研究项目中对数据库系统和技术领域的教育进行评估
J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová
{"title":"Evaluation of education in the field of database systems and technologies within the study programs of economic and managerial focus","authors":"J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová","doi":"10.1109/ICAICT.2014.7036010","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036010","url":null,"abstract":"The authors of this paper present their findings at the level of quantitative statistical analyses within wider international monitoring, in which one of the objectives was to determine the extent to which students of the economic and managerial profiling at ISCED level 5 considered their study points of selected educational topics interesting, which also form part of their educational portfolio from the field of informatics. Students rated to what extent is the topic of teaching relevant for education in the context of those study disciplines, respectively they evaluated through a scale in what extent is the educational content filled from their personal point of view with regard to education in the disciplines studied.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TOFI technology capabilities for data processing and visualization TOFI技术的数据处理和可视化能力
M. Gabbasov
{"title":"TOFI technology capabilities for data processing and visualization","authors":"M. Gabbasov","doi":"10.1109/ICAICT.2014.7035961","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035961","url":null,"abstract":"Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes that processes such as data processing and data visualization on TOFI.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114376876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Channel estimation for SM systems over time-varying Rayleigh fading channels 时变瑞利衰落信道中SM系统的信道估计
Yusuf Acar, H. Dogan, E. Panayirci
{"title":"Channel estimation for SM systems over time-varying Rayleigh fading channels","authors":"Yusuf Acar, H. Dogan, E. Panayirci","doi":"10.1109/ICAICT.2014.7035975","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035975","url":null,"abstract":"This paper is concerned with the challenging and timely problem of channel estimation for spatial modulated systems in the presence of time varying channels. Recently, estimation of channel state information for SM systems is investigated by the recursive least square (RLS) algorithm for slow fading channels. However, it is clear that the RLS based receiver will have a performance degradation for fast fading channels. Therefore, we developed iterative channel estimation based on detected symbols and curve fitting to track the channel variations for SM systems. Simulation results have demonstrated that the proposed iterative channel estimation offer substantial performance gains over the RLS channel estimation. In particular, a savings of about 4dB is obtained at BER = 10-7, as compared with RLS based receiver at 150km/h for 2 × 4 single carrier SM systems.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System for sign language modeling and learning 手语建模与学习系统
I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva
{"title":"System for sign language modeling and learning","authors":"I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva","doi":"10.1109/ICAICT.2014.7035997","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035997","url":null,"abstract":"An approach to the software system development dedicated to the interactive learning of sign language is proposed. A basic architecture of the system, its modules, format and transmission protocol of the data are created. The article also describes the main module of the system responsible for the synthesis and the animation of the gestures and facial expressions of the emotions based on the three-dimensional pattern of a human body. It describes main requirements for the module, analyzing basic problems and the implementations for their solution, architecture and components, especially the ones that are responsible for the generation of the animation, its structure, the algorithm of gestures' combination and their graphical processing.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
tBox: A system to protect a "bad" user from targeted and user-oriented attacks tBox:保护“坏”用户免受定向和面向用户的攻击的系统
Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov
{"title":"tBox: A system to protect a \"bad\" user from targeted and user-oriented attacks","authors":"Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035913","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035913","url":null,"abstract":"We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a \"bad\" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user-activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self-monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while having low system overhead.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
e-Government services vulnerability 电子政府服务漏洞
Ali Shahintash, Yashar Hajiyev
{"title":"e-Government services vulnerability","authors":"Ali Shahintash, Yashar Hajiyev","doi":"10.1109/ICAICT.2014.7035990","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035990","url":null,"abstract":"The employing of ICT applications into operational structure of public administrating is rapidly transforming societal interactions and the relationships among citizens, businesses, and state bodies. To strengthen the controllability and to expand of Internet-based services and processes it is necessary to establish more than just a developed interactive website that provides the right content and most demanded online services to citizen. There is strong demand among citizens for instant access to open public information, for high standards of improved services in a secure fashion. Behind every reliable and efficient application lie the critical elements as extensive infrastructure of digital networks, Internet and application servers, databases and support services. In paper the broad framework of measures that ensure protection of security of e-Government services. The focus of this paper is on results of exploration of two main issues vulnerability and security in e-government.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信