2008 Second Asia International Conference on Modelling & Simulation (AMS)最新文献

筛选
英文 中文
Misuse Intrusion Detection Using a Fuzzy-Metaheuristic Approach 基于模糊-元启发式方法的误用入侵检测
Hamid Mohamadi, J. Habibi, M. S. Abadeh
{"title":"Misuse Intrusion Detection Using a Fuzzy-Metaheuristic Approach","authors":"Hamid Mohamadi, J. Habibi, M. S. Abadeh","doi":"10.1109/AMS.2008.128","DOIUrl":"https://doi.org/10.1109/AMS.2008.128","url":null,"abstract":"In this paper, we use simulated annealing heuristics for constructing an intrusion detection system (IDS). The proposed IDS combines the learning ability of simulated annealing heuristics with the approximate reasoning method of fuzzy systems. The use of simulated annealing is an effort to effectively explore the large search space related to intrusion detection problems, and find the optimum set of fuzzy if-then rules. The aim of this paper is to present the capability of simulated annealing based fuzzy system to deal with intrusion detection classification problem as a new real-world application area. Experiments were performed with KDD-Cup99 intrusion detection benchmark data set.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Time Warping Speech Recognition System Based on Particle Swarm Optimization 基于粒子群优化的时间翘曲语音识别系统
Saeed Rategh, F. Razzazi, A. Rahmani, S. Gharan
{"title":"A Time Warping Speech Recognition System Based on Particle Swarm Optimization","authors":"Saeed Rategh, F. Razzazi, A. Rahmani, S. Gharan","doi":"10.1109/AMS.2008.156","DOIUrl":"https://doi.org/10.1109/AMS.2008.156","url":null,"abstract":"In this paper, dynamic programming alignment is replaced by a particle swarm optimization (PSO) procedure in time warping problem. The basic PSO is a very slow process to be applied to speech recognition application. In order to achieve a higher performance, by inspiring of PSO optimization methodology, we introduced a PSO inspired time warping algorithm (PTW) that significantly increase the computational performance of time warping in alignments of long length massive data sets. As a main enhancement, a pruning strategy with an add-in controlling threshold is defined in PTW that causes a considerable reduction in recognition time, while maintaining the system accuracy comparing to DTW.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Algorithm for Isomorphic Problem on Generic Simple Graphs 一般简单图上同构问题的一种有效算法
Ngoc-Bao Tran, D. Nguyen
{"title":"An Efficient Algorithm for Isomorphic Problem on Generic Simple Graphs","authors":"Ngoc-Bao Tran, D. Nguyen","doi":"10.1109/AMS.2008.20","DOIUrl":"https://doi.org/10.1109/AMS.2008.20","url":null,"abstract":"Graph isomorphism has received considerable attention because of many of the practical applications of the problem. Also, researchers have not yet been able to discover where the graph isomorphism problem fits into the NP complexity model. In this paper, we establish necessary conditions for graph isomorphism problem. Based on these conditions, algorithms are proposed in order to solve the graph isomorphism problem in reasonable time. In the best-case time complexity for our algorithm is O(N) where N is the number of vertices. The proposed algorithm is applied to undirected simple graphs, i.e., graphs with undirected edges so that (u, v) and (v, u) are considered to be the same edge. This result can be used into authentication methods based on graph isomorphism.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combining ITIL, COBIT and ISO/IEC 27002 in Order to Design a Comprehensive IT Framework in Organizations 结合ITIL、COBIT和ISO/IEC 27002,为组织设计一个全面的IT框架
S. Sahibuddin, Mohammad Sharifi, Masarat Ayat
{"title":"Combining ITIL, COBIT and ISO/IEC 27002 in Order to Design a Comprehensive IT Framework in Organizations","authors":"S. Sahibuddin, Mohammad Sharifi, Masarat Ayat","doi":"10.1109/AMS.2008.145","DOIUrl":"https://doi.org/10.1109/AMS.2008.145","url":null,"abstract":"Several frameworks, tools and standards have been included in IT management systems, in organizations. However, on their own, they are not comprehensive enough to serve as efficient IT management system. This paper reviews two established frameworks, i.e. ITIL, COBIT and a standard, ISO/IEC 27002 focusing on their similarities and differences. It then proposes a comprehensive framework by integrating the three general framework and standards into an IT framework that could be used in every company.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115701647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
A Heuristic Coordinate Filtering Scheme to Aid Online Indexing of Spatio-Temporal Trajectories 一种启发式坐标过滤方案帮助在线索引时空轨迹
Hamimah Ujir, I. Hipiny
{"title":"A Heuristic Coordinate Filtering Scheme to Aid Online Indexing of Spatio-Temporal Trajectories","authors":"Hamimah Ujir, I. Hipiny","doi":"10.1109/AMS.2008.154","DOIUrl":"https://doi.org/10.1109/AMS.2008.154","url":null,"abstract":"Traditional online indexing of spatio-temporal trajectories requires indexing coordinates at fixed intervals or each time the moving object changes direction or velocity. We propose a heuristic coordinate filtering scheme to help evaluate each periodically sampled coordinate candidacy for indexing. Successful coordinates are the minimum trajectory's coordinates required as control points during the cubic spline interpolation process; invoked whenever a spatio-temporal historical query is made on the indexed trajectory. Using our heuristic coordinate filtering scheme, the number of indexed coordinates is significantly reduced to 25% - 35% of the original amount required by the traditional indexing methods, yet the indexed trajectory's integrity is well preserved. Both heuristic coordinate filtering and cubic spline interpolation step require minimal time penalty, hence allowing our method for online uses.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Visual Inspection System in Automatic Bottling System Based on PLC 基于PLC的自动装瓶系统视觉检测系统的设计与实现
D. Kurniawan, R. Sulaiman
{"title":"Design and Implementation of Visual Inspection System in Automatic Bottling System Based on PLC","authors":"D. Kurniawan, R. Sulaiman","doi":"10.1109/AMS.2008.111","DOIUrl":"https://doi.org/10.1109/AMS.2008.111","url":null,"abstract":"This paper explains on the design and implementation of automatic visual inspection system in automatic control system based on programmable logic controller (PIC). In addition, this paper also give solution on how to modify conventional PIC to be integrated with visual inspection system. This modification method is more efficient than buying a new PIC and enhances the ability of it. Integration of these systems is implemented in modular automation production system (MAPS). MAPS is a miniature of real bottling system construct from some module which have different function but are integrated together. Visual inspection is done by using low cost and common web cam camera. Every bottle image will be caught by camera and then will be analysed using Real-TIVI program. There are three decisions taken based on the result. The first decision is to accept the bottle, if the size is appropriate with bottle A'. The second decision is to accept if the size of bottle appropriate with bottle 'B'. The last decision is to reject the bottle if the size is not appropriate. This decision then will be sent to PIC through dc hard wire cable. The testing of this system is done in Robotic laboratory Faculty Information Science and Technology (FTSM) University Kebangsaan Malaysia (UKM). The result showed good performance from the system. The method used in this research can be implemented in other industries such as pharmacy and food and drink inspection.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115821749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
O2DSS: A Framework for Ontology-Based Decision Support Systems in Pervasive Computing Environment 普适计算环境下基于本体的决策支持系统框架
Amin Saremi, M. Esmaeili, J. Habibi, A. Ghaffari
{"title":"O2DSS: A Framework for Ontology-Based Decision Support Systems in Pervasive Computing Environment","authors":"Amin Saremi, M. Esmaeili, J. Habibi, A. Ghaffari","doi":"10.1109/AMS.2008.130","DOIUrl":"https://doi.org/10.1109/AMS.2008.130","url":null,"abstract":"Applications in pervasive computing environment exploit information about the context of use, such as the location, tasks and preferences of the user, in order to adapt their behavior in response to changing operating environments and user requirements. Utilizing context with aid of ontology in data and model, decision support systems can provide better and more desirable support to their users. The effects and advantages of exploiting ontology in user modeling and DSS is discussed. We propose a framework of a ontology-based decision support system (O2DSS), including ontology in model base, database and their advantages.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115982978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Advanced Supply Chain Protection & Integrated Decision Support System 先进的供应链保护和综合决策支持系统
F. Longo, M. Massei
{"title":"Advanced Supply Chain Protection & Integrated Decision Support System","authors":"F. Longo, M. Massei","doi":"10.1109/AMS.2008.172","DOIUrl":"https://doi.org/10.1109/AMS.2008.172","url":null,"abstract":"This research is looking forward for developing innovative tools for analysis and optimization of risk related to evolution of Small & Medium Enterprises (SMEs) respect to supply chain management issues. In fact, SMEs require decision supports in order to keep under control the dynamic evolution of the supply chain. In the last years, the globalization as well as the quick changes in world situation pushed to outsource operations and activities, therefore this direction requires to be evaluated in term of risks. The authors propose to use modelling for evaluating the impact on the supply chain of different aspects such as international competition, know-how diffusion in new areas, critical events and disasters. These factors, in addition the effect on the single supply chain vulnerability, generate interactions that can result even more critical. The authors are looking forward to develop also a metrics to be estimated by simulation models in order to compare different scenarios in supply chain management.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reducing the Cluster Overhead by Selecting Optimal and Stable Cluster Head through Genetic Algorithm 利用遗传算法选择最优稳定簇头,降低簇开销
S. Muthuramalingam, R. Malarvizhi, R. Veerayazhini, R. Rajaram
{"title":"Reducing the Cluster Overhead by Selecting Optimal and Stable Cluster Head through Genetic Algorithm","authors":"S. Muthuramalingam, R. Malarvizhi, R. Veerayazhini, R. Rajaram","doi":"10.1109/AMS.2008.107","DOIUrl":"https://doi.org/10.1109/AMS.2008.107","url":null,"abstract":"This paper proposes an idea for selecting cluster heads which are not only stable but also reduces the overhead in maintaining the cluster architecture. Cluster maintenance overheads can be minimized by minimizing the number of generated clusters and the variance of the number of cluster members. The goal is to provide a generic and stable cluster structure for the upper layers. The optimization is done through genetic algorithm.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption 广播加密的低带宽自愈密钥分配
Ratna Dutta, S. Mukhopadhyay, S. Emmanuel
{"title":"Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption","authors":"Ratna Dutta, S. Mukhopadhyay, S. Emmanuel","doi":"10.1109/AMS.2008.171","DOIUrl":"https://doi.org/10.1109/AMS.2008.171","url":null,"abstract":"We introduce a new self-healing key distribution scheme with revocation capability. The main improvement that our proposed construction achieves over previously suggested self-healing key distribution schemes is that our self-healing technique reduces communication overhead from O(tj) to O(t+j) without any additional increment in the storage cost as compared to the earlier approaches, where j is the current session number and t is the maximum number of compromised group members that may collude. We provide rigorous treatment of security of our scheme in an appropriate security framework and show that it is unconditionally secure with forward and backward secrecy.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131726346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信