2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
An entropy-based VoIP flooding attacks detection and prevention system 基于熵的VoIP泛洪攻击检测与防范系统
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993385
Reihaneh Haji Mahdizadeh Zargar, M. Moghaddam
{"title":"An entropy-based VoIP flooding attacks detection and prevention system","authors":"Reihaneh Haji Mahdizadeh Zargar, M. Moghaddam","doi":"10.1109/ICCKE.2014.6993385","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993385","url":null,"abstract":"Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly. With the growth of each technology, the related security issues become of particular importance. Being IP-based and playing a signaling role in VOIP networks, SIP protocol lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attacks, a branch of which in this article we have discussed about is flooding attack. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and low rate attacks can mislead many attack detection mechanisms. In this paper, we have presented an anomaly based method in order to detect and prevent flooding attacks by using Entropy. In this method we examined the VOIP network traffic with the help of entropy. Entropy makes it possible for us to accurately detect the changes in the network traffic and identify the attacker or attackers with the help of the Compressed summarized table of packet data (Sketch). The proposed method is fully implemented and has been tested using the Spirent server. The results of our implementation show the proposed method was able to detect distributed and low rate flooding attacks accurately, without causing significant delay and overhead on the SIP server.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Gammatonegram based speaker identification 基于伽玛图的说话人识别
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993383
Aref Farhadi Pour, M. Asgari, Mohammad Reza Hasanabadi
{"title":"Gammatonegram based speaker identification","authors":"Aref Farhadi Pour, M. Asgari, Mohammad Reza Hasanabadi","doi":"10.1109/ICCKE.2014.6993383","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993383","url":null,"abstract":"Speech signals contains important information to use for different purposes such as surveillance, smart home, medicine, etc. Thus, classification of these signals are chief to consider for further applications. This article presents a simple method that has lower calculations for center process unit to achieve results as well as faster reaction time and high accuracy. Many method exist in speech signal classification which have their own advantages and disadvantages with regard to their application. In this paper, we propose a new method in speech classification based on human auditory system mixed to spectrogram features. The basilar membrane filters or auditory filters are often modeled by a gammatone function which provides a good approximation to experimentally determined responses. The filter bank derived from these filters is referred as a gammatone filterbank and since STFT can also be likened to a filterbank analysis, these will be an interesting link between standard STFT and gammatone filterbank. A popular tool in time-frequency analysis is spectrogram. Using gammatone filterbank in spectrogram, the method interchanges the fixed filters in all bands and approaches a new diagram called Gammatonegram.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"666 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Graph pyramid embedding in vector space 图金字塔嵌入在向量空间
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993387
S. F. Mousavi, M. Safayani, Abdolreza Mirzaei
{"title":"Graph pyramid embedding in vector space","authors":"S. F. Mousavi, M. Safayani, Abdolreza Mirzaei","doi":"10.1109/ICCKE.2014.6993387","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993387","url":null,"abstract":"Graph-based representation has an effective and extensive usage in pattern recognition due to represent properties of entities and binary relations at the same time. But a major drawback of graphs is lack of basic and essential mathematical operations required in many algorithms of pattern recognition. To overcome this problem, graph embedding in vector space enables classical statistical learning algorithms to be used on graph-based input patterns by providing a feature vector for each graph. The aim of this paper is to propose a new generic framework of graph embedding based on ideas from multiresolution theory. The main idea is mapping image pyramid from field of image processing to graph pyramid in graph domain. To this end, we suggest a summarization algorithm that can be used on graphs with continuous node labels. Finally we use resulted graph pyramid for a hierarchical embedding. In an experimental evaluation, we will show the advantages of this new approach in the context of classification problems.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133905300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A focused linked data crawler based on HTML link analysis 基于HTML链接分析的重点链接数据爬虫
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993406
Reihaneh Emamdadi, M. Kahani, F. Zarrinkalam
{"title":"A focused linked data crawler based on HTML link analysis","authors":"Reihaneh Emamdadi, M. Kahani, F. Zarrinkalam","doi":"10.1109/ICCKE.2014.6993406","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993406","url":null,"abstract":"Linked Data can be published as RDF documents or embedded in HTML documents. A linked data crawler is a program that discovers the published linked data from the web by following RDF links. Note that there are RDF documents that are surrounded by HTML documents. Therefore, linked data crawlers require to follow HTML links in addition to RDF links to be able to discover such RDF documents as well as harvest the embedded linked data in HTML documents. However, many HTML documents have not embedded any linked data and not pointed to any RDF documents. So, crawling such HTML documents decreases discovery rate of RDF documents per unit of network bandwidth and wastes computation resources on non-RDF documents. In this paper, a focused linked data crawler is proposed to address this problem. The proposed crawler analyzes and prioritizes HTML links by calculating the possibility that a link will lead to an RDF document. The experimental evaluation shows that the proposed approach is effective in terms of increasing discovery rate of RDF document in comparison with a non-focused linked data crawler.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"321 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133911132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling of self-similar network traffic using artificial neural networks 基于人工神经网络的自相似网络流量建模
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993452
M. M. Mirzaei, K. Mizanian, M. Rezaeian
{"title":"Modeling of self-similar network traffic using artificial neural networks","authors":"M. M. Mirzaei, K. Mizanian, M. Rezaeian","doi":"10.1109/ICCKE.2014.6993452","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993452","url":null,"abstract":"Self-similarity is a phenomenon which has come into computer networks literatures during last two decades and plays a significant role in modeling of computer network traffics. It is generally accepted that computer network traffics are self-similar and they are dissimilar to Poisson-based traffics. Computer network models exert a considerable influence on improving quality of service. Therefore, self-similarity should be considered in traffic models in order to acquire more appropriate QoS. In this paper, we propose a novel model for generating self-similar traffic. Our model includes a multi-layer perceptron neural network and a random error generator. This model has two phases: Firstly, the model is trained with real network traffic. Secondly, with the assistance of the random error generator, it generates traffic which is as self-similar as the real traffic. The implementation and the results validate this model through drawing a comparison between the Hurst parameter of the generated traffic and the real traffic.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132611730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using structural information for reduced reference image quality assessment 使用结构信息减少参考图像质量评估
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993368
Ehsanhosein Kalatehjari, F. Yaghmaee
{"title":"Using structural information for reduced reference image quality assessment","authors":"Ehsanhosein Kalatehjari, F. Yaghmaee","doi":"10.1109/ICCKE.2014.6993368","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993368","url":null,"abstract":"Reduced-reference (RR) image quality assessment (IQA) aims to achieve higher evaluation accuracy by using only partial information about the reference image. In this paper we propose a novel Reduced-reference image quality assessment method which uses the Singular Value Decomposition (SVD) algorithm for reducing the amount of information. Using the SVD components makes the proposed quality metric enable to evaluate the image quality in the spatial domain and get more accuracy while reducing a high amount of information. The novel approach employs the multi-scale structural similarity index (MS-SSIM). Therefore structure information is used for achieving superior prediction accuracy. In this way, the proposed method can reach similar accuracy as the widely used full-reference (FR) image quality metric MS-SSIM.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost minimization scheduling for deadline constrained applications on vehicular cloud infrastructure 车辆云基础设施上期限约束应用的成本最小化调度
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993446
Leila Aminizadeh, S. Yousefi
{"title":"Cost minimization scheduling for deadline constrained applications on vehicular cloud infrastructure","authors":"Leila Aminizadeh, S. Yousefi","doi":"10.1109/ICCKE.2014.6993446","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993446","url":null,"abstract":"Two categories of reasons have led to the emergence of vehicular cloud computing; on one hand vehicular networks and the new generation of well-equipped smart cars and on another, the advent of cloud computing and its maturity over a short time-span. Owing to these two facts, the concept of vehicular cloud computing has been shaped up in the recent years in which cloud services are offered through underutilized resources of vehicles that construct a dynamic groups of autonomous vehicles and therefore create a cloud. The difference between this set-up and conventional structures of cloud computing lies in the mobility of nodes which leads to change in the dynamics of resource availability over time. The goal of this study is to offer an application scheduling model for determining the optimum response needed for management of dynamic vehicular cloud resources in a way that tasks are completed with minimum cost; before their deadlines and within the lifetime of the cloud. To solve the aforementioned problem, a binary integer program model is formulated here, and the impact of changes in various parameters such as different tasks costs, application deadlines, types and lifetime of created clouds are analyzed and evaluated. The presented results, specify and highlight the factors that should be taken into consideration in the process of application scheduling and demonstrate how our proposed optimization model could result in reliable solutions for the vehicular computing optimization problems.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Parameter tuning of GSA using DOE 基于DOE的GSA参数调优
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993390
M. Amoozegar, E. Rashedi
{"title":"Parameter tuning of GSA using DOE","authors":"M. Amoozegar, E. Rashedi","doi":"10.1109/ICCKE.2014.6993390","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993390","url":null,"abstract":"Parameter tuning has critical influences on the performance of evolutionary algorithms. Deliberate parameter investigation and changing the value of them is very expensive and time consuming. This paper has applied Design of Experiment (DOE) method to tune the parameters of Gravitational Search Algorithms (GSA) systematically. Also, to reduce its complexity and increase the performance, simple modification has been presented to determine the number of effective objects (Kbest). Best configurations of 17 standard functions are obtained by executing DOE. Analysis of the results confirms that parameter tuning and Kbest modification have improved the performance of the GSA. Meanwhile, these results have been obtained by least experiments in acceptable time.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Leveraging spatial analysis on homogonous regions of color images for skin classification 利用空间分析对彩色图像的同质区域进行皮肤分类
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993338
M. Mahmoodi, S. Sayedi
{"title":"Leveraging spatial analysis on homogonous regions of color images for skin classification","authors":"M. Mahmoodi, S. Sayedi","doi":"10.1109/ICCKE.2014.6993338","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993338","url":null,"abstract":"Skin detection is one the most studied subjects in vision literature. Due to the appealing features of skin segmentation algorithms, they are widely used in different biometric applications such as face detection, face recognition, face tracking, hand gesture recognition, etc. However, several challenges such as nonlinear illumination, equipment effects, personal interferences, ethnicity variations, etc are involved which have been yielded to the inefficiency of many color based methods. Even though several interesting ideas have already been proposed, the problem has not been satisfactorily solved yet. This paper introduces a skin segmentation technique that addresses limitations of the earlier works. The proposed system consists of some steps including initial seed generation of skin map, Otsu segmentation in color images and a super two stage diffusion method. The initial seed of skin pixels is provided based on the idea of ternary image as there are certain pixels in images which are associated to human complexion with very high probability. The Otsu segmentation is performed on Cb and Cr of YCbCr color space, I of YIQ, H of HSV, a of Lab, u of Luv and c of Lch and the result accompanying with the edge map of the image is utilized in diffusion stage in order to annex initially unidentified skin pixels to the seed. Both quantitative and qualitative results demonstrate the effectiveness of the proposed system in compare with the state-of-the-art works.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient 3D gradient-based algorithm for medical image registration using correlation-coefficient maximization 基于相关系数最大化的三维梯度医学图像配准算法
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993401
S. Etemadi, M. Saadatmand-Tarzjan, M. Shamirzaei, J. Khosravi
{"title":"An efficient 3D gradient-based algorithm for medical image registration using correlation-coefficient maximization","authors":"S. Etemadi, M. Saadatmand-Tarzjan, M. Shamirzaei, J. Khosravi","doi":"10.1109/ICCKE.2014.6993401","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993401","url":null,"abstract":"Most registration algorithms for medical images may suffer from slow convergence and sensitivity to initialization. In this paper, we propose an efficient gradient-based algorithm for rigid intensity-based registration of medical images. It takes advantage of gradient-descend approach for maximizing the correlation coefficient similarity measure. Furthermore, we automatically adjust the optimization rate of algorithm for weak local minima avoidance and convergence acceleration. Experimental results demonstrated superior performance of the proposed algorithm compared to Powell's method (as a non-gradient algorithm) in terms of CPU time and solution quality for two sets of medical images.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信