{"title":"Agent Verification Protocol in Agent-Based IDS","authors":"L. Nasir, K. Seman, M. Saudi","doi":"10.1109/CIT.2008.WORKSHOPS.122","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.122","url":null,"abstract":"Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Effective Hidden Web Search Using Iterative Deepening Search and Graph Theory","authors":"A. Ibrahim, S.A. Fahmi, S. I. Hashmi, Ho‐Jin Choi","doi":"10.1109/CIT.2008.WORKSHOPS.81","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.81","url":null,"abstract":"Deep web refers to the hidden portion of the WWW (World Wide Web) which cannot be accessed directly. One of the important issues in the WWW is how to search the hidden Web. Several techniques have been proposed in order to address this issue. In this paper, we have surveyed the current problems of retrieving information from hidden Web and proposed a solution to solve these problems using probability, iterative deepening search and graph theory.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Wu, Feng Ye, Jianlin Ma, Xiaoping Sun, Jing Xu, Zhi-ming Cui
{"title":"The Segmentation and Visualization of Human Organs Based on Adaptive Region Growing Method","authors":"Jian Wu, Feng Ye, Jianlin Ma, Xiaoping Sun, Jing Xu, Zhi-ming Cui","doi":"10.1109/CIT.2008.WORKSHOPS.24","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.24","url":null,"abstract":"The visualization of medical volumetric data is an important area of scientific visualization. 3-D segmentation plays a critical role by facilitating automatic or semi-automatic extraction of the anatomical organ or region-of-interest. Segmentation s an important aspect of medical image processing, whose purpose is to extract the region of interest from the original images to provide a reliable basis for clinical diagnosis, pathological analysis and treatment. In this paper we introduce an adaptive region growing algorithm for image segmentation by estimating the parameters through investigation of the statistical characteristics in local regions. And through visualization technology, its segmentation results is showed. The experimental results demonstrate the simplicity and effectivity of the approach, and the results is in accordance with our understanding on the semantic concepts and the perceptual mechanism of human eyes.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Software Tool For Power Quality Diagnosis","authors":"N. Hamzah, Z. Zakaria, A. Mohamed, A. Hussain","doi":"10.1109/CIT.2008.WORKSHOPS.18","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.18","url":null,"abstract":"This paper focuses on a novel automatic software tool to locate three major power quality disturbances, i.e. voltage sag, transient and harmonic. The software tool developed is to locate the source of these disturbances relative to a monitoring point. The methods employed in the software only require the current and voltage data. For locating the source of voltage sag, the product of the RMS current and the power factor angle at the monitoring point is employed and the complex wavelet-based energy is employed for locating the source of transients. A new method to determine the source of harmonic at the point of common coupling as to whether it is from the upstream or downstream is based on the harmonic Thevenin circuit. The proposed methods are written in MATLAB V. 7 and graphic user interface software is developed to automate the new methods. This new software has been tested using both real and simulation data and it is very fast, simple and accurate to locate the power quality disturbances.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131858849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Worlds: The Next Generation for Solving Engineering Problems","authors":"M. Sidhu, R. Singh","doi":"10.1109/CIT.2008.WORKSHOPS.7","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.7","url":null,"abstract":"This paper describes an approach to implementing technology-assisted problem solving (TAPS) package using desktop virtual reality interface that brings together a 3-D model of an engineering mechanics problem in an interactive manner. It provides the user with a self-study environment in which to solve an engineering mechanics problem in mechanical engineering course. The package guides the user to solve a problem in a step-by-step approach and graphical environment. Integrating components such as 2-D, 3-D and stereoscopic images provides dynamic learning environment and guidance so that the learner can analyze the necessary actions to be taken in the virtual environment. Preliminary evaluation indicated that the TAPS package has great potential to aid teaching and thus provide an effective learning environment.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"38 10S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Linguistic Steganography Detection","authors":"Zhi-li Chen, Liu-sheng Huang, Zhenshan Yu, Xin-xin Zhao, Xue-ling Zhao","doi":"10.1109/CIT.2008.WORKSHOPS.69","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.69","url":null,"abstract":"Linguistic steganography is an art of concealing secret messages. More specifically, it takes advantage of the properties of natural language, such as the linguistic structure to hide messages. In this paper, an effective method for linguistic steganography detection is presented. In virtue of the concepts in area of information theory, the method uses an information entropy-like statistical variable of words in detected text segment together with its variance as two classification features. The support vector machine is used as classifier. The method was centered on detection for small size text segments estimated in the hundreds in words. Its achievement is simple and its execution is fast and relatively accurate. In our experiment of detecting the three different linguistic steganography methods: NICETEXT, TEXTO and Markov-chain-based, the accuracy exceeds 90%. As a result, our method can be used as a common pre-detection method followed by a more specific and accurate detection method.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Defining Keys for XML","authors":"M. Shahriar, Jixue Liu","doi":"10.1109/CIT.2008.WORKSHOPS.70","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.70","url":null,"abstract":"Keys are an important part of any data model. In relational model, keys are well studied and are widely used. In recent years, XML has emerged as an widely used data representation and storage format in the world wide Web. The data centric approach of XML has necessitated the definition of integrity constraints for XML. XML key is regarded as one of those integrity constraints. In this paper, we define XML keys, specifically for the purpose of XML data transformation and integration with integrity constraints. In the proposal, we show how XML keys are defined on the XML document type definition (DTD) and are satisfied by the XML documents. We introduce the novel concept P-tuple (pair-wise tuple) that produces semantically correct tuples in the XML document during key satisfaction. Our definition for XML keys can also be extended to XML relative keys. Finally, we discuss how our proposal for XML keys has some advantages over other previous proposals and standards.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee
{"title":"A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks","authors":"Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee","doi":"10.1109/CIT.2008.WORKSHOPS.28","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.28","url":null,"abstract":"Recent development of sensor and computer technology enabled WSNs (wireless sensor networks) to be expanded. To conserve power from each sensor, intermediate nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. In simulation result, since the proposed scheme distributed key management role to an internal node to avoid parent node's concentrated management, it has 3.5% lower energy consumption load caused by key management; 0.3% and 0.6% more improved key transmission time and process time, respectively, compared with LHA-SP.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Approach Using Automatic Seed Generation and Hybrid Classification for the Detection of Red Lesions in Digital Fundus Images","authors":"S. Pradhan, S. Balasubramanian, V. Chandrasekaran","doi":"10.1109/CIT.2008.WORKSHOPS.35","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.35","url":null,"abstract":"In this paper we propose a novel method for automatic detection of microaneurysms (MA) and hemorrhages (HG)grouped as red lesions. Candidate extraction is achieved by automatic seed generation (ASG) which is devoid of morphological top hat transform (MTH). For classification we tested on linear discriminant classifier (LMSE), kNN, GMM, SVM and proposed a Hybrid classifier that incorporates kNN and GMM using 'max' rule. Inclusion of a new feature called elliptic variance during classification phase has significantly reduced the false positives. An integrated approach using ASG and the hybrid classifier reports the best sensitivity of 87% with 95.53% specificity.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shimpei Yamada, Y. Nakamoto, Takuya Azumi, Hiroshi Oyama, Hiroaki Takada
{"title":"Generic Memory Protection Mechanism for Embedded System and Its Application to Embedded Component Systems","authors":"Shimpei Yamada, Y. Nakamoto, Takuya Azumi, Hiroshi Oyama, Hiroaki Takada","doi":"10.1109/CIT.2008.WORKSHOPS.71","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.71","url":null,"abstract":"Memory protection mechanisms have become important in an embedded system. Previously, embedded systems, especially small-size systems, did not need memory protection mechanisms. However, recent embedded systems require memory protection mechanisms. That is because large, complex programs in a large embedded system, such as car navigation systems and high-end cellular phones, cause unreliability due to program corruption caused by buggy programs. In embedded systems, unlike a general purpose computer system, several resources to be protected are distributed in an OS through middleware and applications. In this paper, we propose a generic memory protection mechanism for an embedded system with dynamic protection change. We also present its application to embedded component systems for increasing the reliability of the system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}