2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
A novel approach for combinatorial test case generation using multi objective optimization 一种基于多目标优化的组合测试用例生成方法
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167914
A. Sabbaghi, M. Keyvanpour
{"title":"A novel approach for combinatorial test case generation using multi objective optimization","authors":"A. Sabbaghi, M. Keyvanpour","doi":"10.1109/ICCKE.2017.8167914","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167914","url":null,"abstract":"Combinatorial testing is a promising technique for testing highly-configurable systems. Software systems become larger and more complex every day, and due to the time and cost limitations, it is infeasible to test everything in a software with a large configuration space, or a graphical user interface with many settings and events. Combinatorial testing generates an interaction test suite to discover faults caused by parameter interactions using a systematic sampling method. Generation of an optimal test suite in combinatorial testing despite the necessity of determining the execution order of test cases and considering constraints is a challenging process. In this paper, we consider the combinatorial testing as a multiobjective optimization problem and propose a novel approach to generate combinatorial test cases by considering all metrics simultaneously. The experimental results showed the effectiveness of the proposed approach in generating test suites with reduced size and increased priority while the higher priority test cases are generated earlier and the higher priority parameter-values appear more frequently.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124312929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BlindLocation: Supporting user location privacy using blind signature 盲定位:通过盲签名支持用户位置隐私
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167928
M. Ashouri-Talouki, Ahmad Baraani-Dastjerdi, N. Movahedinia
{"title":"BlindLocation: Supporting user location privacy using blind signature","authors":"M. Ashouri-Talouki, Ahmad Baraani-Dastjerdi, N. Movahedinia","doi":"10.1109/ICCKE.2017.8167928","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167928","url":null,"abstract":"Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method called “BlindLocation”, to support users' location privacy during the use of location-based queries. In BlindLocation method, without a third trusted party, the user gets the desired service with a high quality while preserving her location privacy. In this method, the mobile database server receives a location-dependent query and a location object without any clue about the owner of this information. BlindLocation also provides a mechanism to anonymously authenticate the user, such that the mobile database cannot access to users' identities, while it can verify users' authorization. Consequently, location information is protected from the mobile databases, as well as malicious attackers. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized differential evolution 广义差分演化
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167916
H. S. Noghabi, H. R. Mashhadi, G. K. Shojaee
{"title":"Generalized differential evolution","authors":"H. S. Noghabi, H. R. Mashhadi, G. K. Shojaee","doi":"10.1109/ICCKE.2017.8167916","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167916","url":null,"abstract":"Differential Evolution (DE) proved to be one of the most successful evolutionary algorithms for global optimization purposes in continuous problems. The core operator in DE is a mutation which can provide the algorithm with both exploration and exploitation. In this article, a new notation for DE is proposed which has a formula that can be utilized for generating and extracting novel mutations and by applying this new notation, four novel mutations are proposed. More importantly, by combining these novel trial vector generation strategies and four other well-known ones, we proposed Generalized Differential Evolution (GDE) that takes advantage of two mutation pools that have both explorative and exploitative strategies inside them. Results and experimental analysis are performed on CEC2005 benchmarks and the results stated that GDE is surprisingly competitive and significantly improved the performance of this algorithm.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ranking of heart hospitals using cross-efficiency and two-stage DEA 应用交叉效率和两阶段DEA对心脏病医院进行排名
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167878
Mirpouya Mirmozaffari, A. Alinezhad
{"title":"Ranking of heart hospitals using cross-efficiency and two-stage DEA","authors":"Mirpouya Mirmozaffari, A. Alinezhad","doi":"10.1109/ICCKE.2017.8167878","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167878","url":null,"abstract":"Heart patients shows several symptoms and it is rigid to point them. Data envelopment analysis (DEA) delivers a comparative efficiency degree for each decision-making units (DMUs) with several inputs and outputs. Evaluating of hospitals is one of the major applications in DEA. In current study, CCR input oriented (CCRIO) model is applied. A new-two stage DEA model and a cross-efficiency are considered for efficiency evaluation and ranking of DMUs at the same periods. The data covers a six-year span from 2011 to 2016 for 12 local heart hospitals. The system was implemented in Banxia Frontier Analyst software and average efficiency scores, efficient DMUs contribution, inefficient DMUs reference, number of efficient DMUs, number of inefficient DMUs, target and potential improvement are compared. The sixth, the tenth and the eleventh hospitals with five high efficient DMUs (100%) among six DMUs are introduced as the highest performance hospitals and second period with an average efficiency of 85.07% is presented by means of the best presentation period.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Optimistic initial value analysis in a greedy selection approach to MAB problems MAB问题的贪婪选择方法中的乐观初值分析
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167915
Kambiz Shojaee, H. R. Mashhadi
{"title":"Optimistic initial value analysis in a greedy selection approach to MAB problems","authors":"Kambiz Shojaee, H. R. Mashhadi","doi":"10.1109/ICCKE.2017.8167915","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167915","url":null,"abstract":"The Multi Arm Bandit (MAB) problem is a well-known decision making problem, where the gambler (operator), seeks the highest value and best choice among arms with different reward distributions. In recent years, many effective strategies have been proposed for the mentioned MAB problem. The strategy's procedure mainly includes attempts on acquiring a better exploitation and efficiency, while also maximizing reliability by effectively exploring the search space. Hence, a suitable tradeoff between exploration and exploitation has been deemed necessary for achieving highest expected rewards. In the presented paper, the effect of assigning initial values has been studied as a deciding factor in the aforementioned tradeoff. In this regard, the initial value has been studied as an implicit exploration agent in greedy based selection strategies. Simulation and comparison of five methods have been presented and evaluated, using a similar exemplary case. Contrary to common belief, the obtained results have illustrated the high efficiency and exploration capability with proper initializing.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132838885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online privacy preserving outsourcing of large matrix multiplication 大矩阵乘法的在线隐私保护外包
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167882
Fatemeh Erfan, H. Mala
{"title":"Online privacy preserving outsourcing of large matrix multiplication","authors":"Fatemeh Erfan, H. Mala","doi":"10.1109/ICCKE.2017.8167882","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167882","url":null,"abstract":"Outsourcing computation to cloud server has recently become popular in cloud computing. Cloud computing technologies enable clients with limited computational resources to outsource their massive computations to powerful cloud servers. Outsourcing computation has some new concerns, such as outsourced data and result privacy, verifiability and efficiency. Matrix multiplication is one of the most basic computational problems. In this paper, we are motivated to design a secure and efficient protocol for outsourcing the massive matrix multiplication computations to the cloud server. The existing works are mostly under amortized model that have an expensive phase as offline mode. Our proposed scheme does not have any expensive phase. So the client can outsource its matrices in online mode in which the efficiency of outsourcing will be increased. In our scheme, the client encrypts two matrices and sends them to a semi-honest cloud server. The cloud server computes matrix multiplication and a proof. After that, it sends the encrypted result to the client and finally the client checks the validity of the computation and decrypts the result. Our proposed scheme achieves privacy protection of outsourced data and multiplication result, unforgeability of proof, verification and high efficiency.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"672 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116103835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast fingerprinting based indoor localization by Wi-Fi signals 基于Wi-Fi信号的快速指纹室内定位
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167884
Nasim Alikhani, Shima Amirinanloo, V. Moghtadaiee, S. Ghorashi
{"title":"Fast fingerprinting based indoor localization by Wi-Fi signals","authors":"Nasim Alikhani, Shima Amirinanloo, V. Moghtadaiee, S. Ghorashi","doi":"10.1109/ICCKE.2017.8167884","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167884","url":null,"abstract":"Indoor localization is vital for location based services as well as security purposes. Wireless local area network (WLAN) positioning systems based on fingerprints of received signal strength (RSS) measured from access points, can be used for localization. Due to the effectiveness of fingerprinting in indoor positioning, fingerprinting network designers try to lower the cost of using this technique in terms of time and energy. In this paper, a fast fingerprinting method is presented, using indoor path-loss model instead of using reference points with complicated measurement devices. The accuracy of the localization by the proposed model is compared with the experimental RSS data collected via smart-phones and the feasibility of the idea is proved.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SDSuPK: Secured data sharing using proxy Kerberos to improve Openstack Swift security SDSuPK:通过代理Kerberos实现安全的数据共享,提高Openstack Swift的安全性
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167933
Sima Attar Khorasani, R. Azmi, V. Sabeti
{"title":"SDSuPK: Secured data sharing using proxy Kerberos to improve Openstack Swift security","authors":"Sima Attar Khorasani, R. Azmi, V. Sabeti","doi":"10.1109/ICCKE.2017.8167933","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167933","url":null,"abstract":"Cloud computing is rather new, and there're, of course, concerns like data-protection. This technology is developing as a standard for data-sharing on remote storages. Cloud has been able to convince users and companies' owners to transfer their data to Cloud so they can use Cloud resources and reduce their costs. Due to importance of data for its owners, there's always concern about security. When the amount of data sent to Cloud increases, giving permission to users and taking it back becomes a challenging topic. Also, as the number of users increases, a large workload lies on Cloud server due to authentication, which is a serious challenge of Cloud. In this paper, we focus on a trusted third-party mechanism, namely Kerberos, to address the mentioned issues. These mechanisms based on tickets are an effective way to ensure user authentication and authorization and force the least interaction and workload to the Cloud server. We designed a mechanism based on Kerberos that completely fits into Openstack Object Storage(Swift) to authenticate and authorize users who desire to access the shared objects. We implement our mechanism and overall system, and evaluate its security and performance. Our results show that our mechanism is practical and efficient.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android ransomware detection using reduced opcode sequence and image similarity Android勒索软件检测使用减少的操作码序列和图像相似度
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167881
A. Karimi, M. Moattar
{"title":"Android ransomware detection using reduced opcode sequence and image similarity","authors":"A. Karimi, M. Moattar","doi":"10.1109/ICCKE.2017.8167881","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167881","url":null,"abstract":"Nowadays Ransomwares are not limited to personal computers. Increasing the number of people accessing cell phones, availability of mobile phone application markets along with lack of an effective way for identifying Ransomwares have accelerated their growth and expansion in the field of mobile phones and IOT. In the following article, an optimal approach is presented that transforms the sequence of executable instructions into a grayscale image and then LDA is used in two phases. LDA is a statistical method that is used for separating two or more classes along with dimension reduction. In the first phase, because the image size is large and it contains information that reduces accuracy rate, its best features are exploited using LDA. In the next phase, LDA is fit to train data and the sample tests are feeded for prediction. The experimental results on two well-known Ransomware families and an unknown group of Ransomwares show that the suggested method is capable of identifying with 97 percent of accuracy.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A cloud-based open automated demand response protocol with AMI support 支持AMI的基于云的开放自动化需求响应协议
2017 7th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2017-10-01 DOI: 10.1109/ICCKE.2017.8167942
Lida Safarzadeh, M. Khorasani, M. Moghaddam
{"title":"A cloud-based open automated demand response protocol with AMI support","authors":"Lida Safarzadeh, M. Khorasani, M. Moghaddam","doi":"10.1109/ICCKE.2017.8167942","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167942","url":null,"abstract":"With the increasing number of clients and emerging of renewable energies to the smart grids, maintaining a balance between supply and demand has become a challenge. One of the most important issues in smart grids is the efficient management of demand for energy transfer and distribution networks, especially in electrical grids. The recent studies mostly try to model the clients' usage patterns to use less electricity preferably, particularly during high usage hours. Nowadays demand response is one of the hottest topics in industry and academia as the demand response programs is one of the main solutions in lowering the peak demand and balancing the supply and demand. On the other hand, increasing in the number of clients in demand response programs highlights the importance of process automation of these programs. In recent years OpenADR has been introduced as the international standard for implementation response programs automation. In this paper, we implemented OpenADR in a lab environment, and the demand response server has been deployed in the private cloud. This implementation supports the ability to register clients with all the electrical device information and also automatic reading for each device and the data related to the smart meter. The goal was to combine the advanced metering infrastructures with demand response programs to reduce deployment costs and integration of services. We send useful information like clients cost, minimum and maximum usage and the average usage in the society to the clients through OpenADR to make motivations for them to reform their usage pattern.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信