2008 IEEE 8th International Conference on Computer and Information Technology Workshops最新文献

筛选
英文 中文
Agent Verification Protocol in Agent-Based IDS Agent- based IDS中的Agent验证协议
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.122
L. Nasir, K. Seman, M. Saudi
{"title":"Agent Verification Protocol in Agent-Based IDS","authors":"L. Nasir, K. Seman, M. Saudi","doi":"10.1109/CIT.2008.WORKSHOPS.122","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.122","url":null,"abstract":"Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Addressing Effective Hidden Web Search Using Iterative Deepening Search and Graph Theory 利用迭代深化搜索和图论解决有效的隐藏网络搜索
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.81
A. Ibrahim, S.A. Fahmi, S. I. Hashmi, Ho‐Jin Choi
{"title":"Addressing Effective Hidden Web Search Using Iterative Deepening Search and Graph Theory","authors":"A. Ibrahim, S.A. Fahmi, S. I. Hashmi, Ho‐Jin Choi","doi":"10.1109/CIT.2008.WORKSHOPS.81","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.81","url":null,"abstract":"Deep web refers to the hidden portion of the WWW (World Wide Web) which cannot be accessed directly. One of the important issues in the WWW is how to search the hidden Web. Several techniques have been proposed in order to address this issue. In this paper, we have surveyed the current problems of retrieving information from hidden Web and proposed a solution to solve these problems using probability, iterative deepening search and graph theory.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Segmentation and Visualization of Human Organs Based on Adaptive Region Growing Method 基于自适应区域生长方法的人体器官分割与可视化
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.24
Jian Wu, Feng Ye, Jianlin Ma, Xiaoping Sun, Jing Xu, Zhi-ming Cui
{"title":"The Segmentation and Visualization of Human Organs Based on Adaptive Region Growing Method","authors":"Jian Wu, Feng Ye, Jianlin Ma, Xiaoping Sun, Jing Xu, Zhi-ming Cui","doi":"10.1109/CIT.2008.WORKSHOPS.24","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.24","url":null,"abstract":"The visualization of medical volumetric data is an important area of scientific visualization. 3-D segmentation plays a critical role by facilitating automatic or semi-automatic extraction of the anatomical organ or region-of-interest. Segmentation s an important aspect of medical image processing, whose purpose is to extract the region of interest from the original images to provide a reliable basis for clinical diagnosis, pathological analysis and treatment. In this paper we introduce an adaptive region growing algorithm for image segmentation by estimating the parameters through investigation of the statistical characteristics in local regions. And through visualization technology, its segmentation results is showed. The experimental results demonstrate the simplicity and effectivity of the approach, and the results is in accordance with our understanding on the semantic concepts and the perceptual mechanism of human eyes.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Novel Software Tool For Power Quality Diagnosis 一种新的电能质量诊断软件工具
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.18
N. Hamzah, Z. Zakaria, A. Mohamed, A. Hussain
{"title":"A Novel Software Tool For Power Quality Diagnosis","authors":"N. Hamzah, Z. Zakaria, A. Mohamed, A. Hussain","doi":"10.1109/CIT.2008.WORKSHOPS.18","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.18","url":null,"abstract":"This paper focuses on a novel automatic software tool to locate three major power quality disturbances, i.e. voltage sag, transient and harmonic. The software tool developed is to locate the source of these disturbances relative to a monitoring point. The methods employed in the software only require the current and voltage data. For locating the source of voltage sag, the product of the RMS current and the power factor angle at the monitoring point is employed and the complex wavelet-based energy is employed for locating the source of transients. A new method to determine the source of harmonic at the point of common coupling as to whether it is from the upstream or downstream is based on the harmonic Thevenin circuit. The proposed methods are written in MATLAB V. 7 and graphic user interface software is developed to automate the new methods. This new software has been tested using both real and simulation data and it is very fast, simple and accurate to locate the power quality disturbances.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131858849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual Worlds: The Next Generation for Solving Engineering Problems 虚拟世界:解决工程问题的新一代技术
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.7
M. Sidhu, R. Singh
{"title":"Virtual Worlds: The Next Generation for Solving Engineering Problems","authors":"M. Sidhu, R. Singh","doi":"10.1109/CIT.2008.WORKSHOPS.7","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.7","url":null,"abstract":"This paper describes an approach to implementing technology-assisted problem solving (TAPS) package using desktop virtual reality interface that brings together a 3-D model of an engineering mechanics problem in an interactive manner. It provides the user with a self-study environment in which to solve an engineering mechanics problem in mechanical engineering course. The package guides the user to solve a problem in a step-by-step approach and graphical environment. Integrating components such as 2-D, 3-D and stereoscopic images provides dynamic learning environment and guidance so that the learner can analyze the necessary actions to be taken in the virtual environment. Preliminary evaluation indicated that the TAPS package has great potential to aid teaching and thus provide an effective learning environment.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"38 10S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effective Linguistic Steganography Detection 有效的语言隐写检测
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.69
Zhi-li Chen, Liu-sheng Huang, Zhenshan Yu, Xin-xin Zhao, Xue-ling Zhao
{"title":"Effective Linguistic Steganography Detection","authors":"Zhi-li Chen, Liu-sheng Huang, Zhenshan Yu, Xin-xin Zhao, Xue-ling Zhao","doi":"10.1109/CIT.2008.WORKSHOPS.69","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.69","url":null,"abstract":"Linguistic steganography is an art of concealing secret messages. More specifically, it takes advantage of the properties of natural language, such as the linguistic structure to hide messages. In this paper, an effective method for linguistic steganography detection is presented. In virtue of the concepts in area of information theory, the method uses an information entropy-like statistical variable of words in detected text segment together with its variance as two classification features. The support vector machine is used as classifier. The method was centered on detection for small size text segments estimated in the hundreds in words. Its achievement is simple and its execution is fast and relatively accurate. In our experiment of detecting the three different linguistic steganography methods: NICETEXT, TEXTO and Markov-chain-based, the accuracy exceeds 90%. As a result, our method can be used as a common pre-detection method followed by a more specific and accurate detection method.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
On Defining Keys for XML 关于为XML定义键
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.70
M. Shahriar, Jixue Liu
{"title":"On Defining Keys for XML","authors":"M. Shahriar, Jixue Liu","doi":"10.1109/CIT.2008.WORKSHOPS.70","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.70","url":null,"abstract":"Keys are an important part of any data model. In relational model, keys are well studied and are widely used. In recent years, XML has emerged as an widely used data representation and storage format in the world wide Web. The data centric approach of XML has necessitated the definition of integrity constraints for XML. XML key is regarded as one of those integrity constraints. In this paper, we define XML keys, specifically for the purpose of XML data transformation and integration with integrity constraints. In the proposal, we show how XML keys are defined on the XML document type definition (DTD) and are satisfied by the XML documents. We introduce the novel concept P-tuple (pair-wise tuple) that produces semantically correct tuples in the XML document during key satisfaction. Our definition for XML keys can also be extended to XML relative keys. Finally, we discuss how our proposal for XML keys has some advantages over other previous proposals and standards.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks 一种保证无线传感器网络中间节点稳定性的密钥管理协议
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.28
Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee
{"title":"A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks","authors":"Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee","doi":"10.1109/CIT.2008.WORKSHOPS.28","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.28","url":null,"abstract":"Recent development of sensor and computer technology enabled WSNs (wireless sensor networks) to be expanded. To conserve power from each sensor, intermediate nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. In simulation result, since the proposed scheme distributed key management role to an internal node to avoid parent node's concentrated management, it has 3.5% lower energy consumption load caused by key management; 0.3% and 0.6% more improved key transmission time and process time, respectively, compared with LHA-SP.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Integrated Approach Using Automatic Seed Generation and Hybrid Classification for the Detection of Red Lesions in Digital Fundus Images 基于自动种子生成和混合分类的眼底图像红色病灶检测方法
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.35
S. Pradhan, S. Balasubramanian, V. Chandrasekaran
{"title":"An Integrated Approach Using Automatic Seed Generation and Hybrid Classification for the Detection of Red Lesions in Digital Fundus Images","authors":"S. Pradhan, S. Balasubramanian, V. Chandrasekaran","doi":"10.1109/CIT.2008.WORKSHOPS.35","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.35","url":null,"abstract":"In this paper we propose a novel method for automatic detection of microaneurysms (MA) and hemorrhages (HG)grouped as red lesions. Candidate extraction is achieved by automatic seed generation (ASG) which is devoid of morphological top hat transform (MTH). For classification we tested on linear discriminant classifier (LMSE), kNN, GMM, SVM and proposed a Hybrid classifier that incorporates kNN and GMM using 'max' rule. Inclusion of a new feature called elliptic variance during classification phase has significantly reduced the false positives. An integrated approach using ASG and the hybrid classifier reports the best sensitivity of 87% with 95.53% specificity.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Generic Memory Protection Mechanism for Embedded System and Its Application to Embedded Component Systems 嵌入式系统通用内存保护机制及其在嵌入式组件系统中的应用
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.71
Shimpei Yamada, Y. Nakamoto, Takuya Azumi, Hiroshi Oyama, Hiroaki Takada
{"title":"Generic Memory Protection Mechanism for Embedded System and Its Application to Embedded Component Systems","authors":"Shimpei Yamada, Y. Nakamoto, Takuya Azumi, Hiroshi Oyama, Hiroaki Takada","doi":"10.1109/CIT.2008.WORKSHOPS.71","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.71","url":null,"abstract":"Memory protection mechanisms have become important in an embedded system. Previously, embedded systems, especially small-size systems, did not need memory protection mechanisms. However, recent embedded systems require memory protection mechanisms. That is because large, complex programs in a large embedded system, such as car navigation systems and high-end cellular phones, cause unreliability due to program corruption caused by buggy programs. In embedded systems, unlike a general purpose computer system, several resources to be protected are distributed in an OS through middleware and applications. In this paper, we propose a generic memory protection mechanism for an embedded system with dynamic protection change. We also present its application to embedded component systems for increasing the reliability of the system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信