2014 24th International Conference on Computer Theory and Applications (ICCTA)最新文献

筛选
英文 中文
Aggregating Local Metrics for Global Trust Calculations in the TOR Network 基于聚合局部度量的TOR网络全局信任计算
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521619
Nada M. Abdel Aziem, S. Fahmy, Attallah I. Hashad
{"title":"Aggregating Local Metrics for Global Trust Calculations in the TOR Network","authors":"Nada M. Abdel Aziem, S. Fahmy, Attallah I. Hashad","doi":"10.1109/ICCTA35431.2014.9521619","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521619","url":null,"abstract":"This paper discusses the design and implementation of a distributed trust calculation mechanism that allows users in the peer-to-peer TOR anonymity network to determine whether or not the nodes that comprise the TOR network are malicious. This is done through a cooperative algorithm that allows individual nodes to measure the trust of the TOR nodes they communicate with. The paper measures the performance of this algorithm and shows that the algorithm can accurately identify several kinds of malicious nodes in the TOR network. This paper will focus on the following security issues: the problem of self reported bandwidth and uptime that can lead to low resource attack, geographical location and Denial of service (DoS) attack and how to aggregate all these criteria in one value that indicate whether or not the onion router is malicious. The aggregation is performed using two different techniques, each of which uses the exact same aggregation methods except for geographical location. The first method, which excludes entire geographical locations, produced slightly worse results than the second method, which assigned a scale between 0 and 0.99 for each geographical location to signify its trust","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Trust Management Model for Cloud Computing 云计算混合信任管理模型
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521622
Aya Salama A. Saleh, E. Hamed, M. Hashem
{"title":"Hybrid Trust Management Model for Cloud Computing","authors":"Aya Salama A. Saleh, E. Hamed, M. Hashem","doi":"10.1109/ICCTA35431.2014.9521622","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521622","url":null,"abstract":"Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques like sliding window technique to reach optimum processes for trust value delivery. Trust value is evaluated through integrated mechanisms from literature. Moreover, measuring trust included evaluating SLA violations side to side with consumer customized measures for validating trust. Caching module has been added to ensure optimization of querying trusted services. Moreover, service registry and novel personalized modules have been added for tracking both cloud providers and cloud consumers behaviors. Furthermore, a comparison between literature’s trust models and proposed model has been presented. It discusses criterion for building and evaluating trust. Finally, security analysis is presented to substitute different techniques against known security attacks.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study 基于微博跟踪的人口统计可视化:Twitter案例研究
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521646
Khaled Ahmed, N. Tazi, A. Hossny
{"title":"Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study","authors":"Khaled Ahmed, N. Tazi, A. Hossny","doi":"10.1109/ICCTA35431.2014.9521646","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521646","url":null,"abstract":"Social media contains a lot of useful information that express different aspects of the society using unstructured and temporal data. The main challenge with social media is the huge amount of the data streams to be processed. Such huge data requires huge processing capabilities, including the power, time and cost.This research presents a framework to extract, analyze and visualize the demographics of any country using the micro blogger data streams such as twitter. This increases the ability to search for topics with hash tags per city for a specific country as well as applying data mining techniques. The proposed framework uses big data tools including Hadoop and Hive to analyze the huge amount of textual unstructured data that is extracted from twitter then visualize it as needed.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Process Algebras, Reasoning, And Validation 过程代数,推理和验证
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521621
N. Hassan
{"title":"Process Algebras, Reasoning, And Validation","authors":"N. Hassan","doi":"10.1109/ICCTA35431.2014.9521621","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521621","url":null,"abstract":"Process algebras model concurrent systems, and hence permit system reasoning or validation of concurrent programs. These are bottom up paradigms that start from representation of each element of the system followed by representation of their interactions, i.e., their parallel processing and communication. The representation of agents as terms in an algebra enables derivation either alone or combined with other paradigms such as random variables, and hence process algebra adds its reasoning power. This paper presents these feats and complements with two possible implementations namely: line search, ant colony activation.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prevention Of DOM Based XSS Attacks Using A White List Framework 使用白名单框架防止基于DOM的XSS攻击
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521633
Khaled Ali, Ayman A. Abdel-Hamid, M. Kholief
{"title":"Prevention Of DOM Based XSS Attacks Using A White List Framework","authors":"Khaled Ali, Ayman A. Abdel-Hamid, M. Kholief","doi":"10.1109/ICCTA35431.2014.9521633","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521633","url":null,"abstract":"Web applications are not guaranteed to be safe for both clients and servers since many vulnerabilities can be exploited in a web application to reach a malicious goal. One such vulnerability is Cross Site Scripting or XSS that has many types but in general is aimed at executing malicious scripts at the client’s machine when exploiting vulnerabilities in the server side. Another type of client side XSS vulnerability is called DOM (Document Object Model) Based XSS which can be achieved at client side only without putting any script in the server side. In this paper, we propose a DOM XSS prevention technique that protects the clients from web pages that contain such scripts in the HTML DOM tree source. This is an anti-DOM XSS framework that stops DOM XSS scripts and prevents it at client side. In addition, a prototype tool was implemented which has demonstrated the validity and viability of the proposed framework","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Students’ Attitudes toward Mobile Learning Adoption in Private University in Egypt 埃及私立大学学生对移动学习的态度
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521603
Tamer F Abdelfattah, Ossama Esmail
{"title":"Students’ Attitudes toward Mobile Learning Adoption in Private University in Egypt","authors":"Tamer F Abdelfattah, Ossama Esmail","doi":"10.1109/ICCTA35431.2014.9521603","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521603","url":null,"abstract":"To solve the problem of Education in Egypt keep in mind no. of mobiles (%70) [18]. Mobile Learning not only effective tool for distance learning but also helpful for traditional education, Add how keen student is to it? The research describes the effectiveness of Mobile Learning technologies on student learning, participation and engagement from the perspective of undergraduates in The Arab Academy for Science and Technology and Maritime Transport which specially selected as a case of university that facilitates mobile learning services to staff and students in Egypt. Results suggest that students are performing a wide variety of educational tasks showing more readiness to adopt the use of mobile devices for learning and focus on working for creating a consolidated education for both E. and traditional learning. Finally, the study discusses the prospective for implementation of mobile device use in learning. Despite the locality environment of the study as it focuses on regional private university in Alexandria – Egypt, the study results might also be vital for countries fronting similar difficulties.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biologically Inspired Hierarchical Model for Traffic Sign Recognition 基于生物启发的交通标志识别层次模型
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521641
Amr Abdel Aziz, I. Imam, A. Shoukry
{"title":"Biologically Inspired Hierarchical Model for Traffic Sign Recognition","authors":"Amr Abdel Aziz, I. Imam, A. Shoukry","doi":"10.1109/ICCTA35431.2014.9521641","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521641","url":null,"abstract":"In this research, a study of the Hierarchical Temporal Memory (HTM) model using the Numenta Implementation “Nupic v1.7” and an investigation of its performance in solving the German traffic sign recognition task using standard benchmark data is conducted. Its performance is compared to that of a state of the art Multi-Column Deep Neural Network (MCDNN) that has been proved to exceed the human recognition accuracy for the same task.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency Centers 基于质量的急诊中心启发式护士调度算法
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521608
Ramy Refat, Ayman E. Taha, S. Senbel
{"title":"A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency Centers","authors":"Ramy Refat, Ayman E. Taha, S. Senbel","doi":"10.1109/ICCTA35431.2014.9521608","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521608","url":null,"abstract":"Nurse scheduling is a very complex task for the human resource director in the health organizations due to the numerous requirements, limitations and rules (often conflicting) that must be considered. Work hours, number of day and night shifts that should be worked by each nurse, the number of consecutive day and night shifts assigned, vacation periods and weekend off requests are important factor during building the scheduling. This paper proposes a Quality Based Nurse Scheduling model (QBNS). It’s a new perspective to solve the nurse scheduling problem for nurse’s duty roster which is one of the most important components in healthcare who provides services to the community round the clock. Nurse scheduling is an orchestrating dynamic process which needs coordination and interaction besides the scheduling shifting methodologies and algorithms. This scheduling has many features. It improves the quality of nurses output and working as teamwork. It also proposes scheduling based on the daily outcome for every nurse through a reliable evaluation technique which automatically distributed the nurses to the shifts in pairs. In addition to previous features it maximizes nurses preferences, minimizes unfairness assignments and finding a balanced/fair schedule.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Agent based University Advising System 基于多agent的大学咨询系统
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521604
Mohammed A. Attia, O. Badawy, E. Kosba
{"title":"Multi-Agent based University Advising System","authors":"Mohammed A. Attia, O. Badawy, E. Kosba","doi":"10.1109/ICCTA35431.2014.9521604","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521604","url":null,"abstract":"Providing accurate advice to undergraduate students during their undergraduate program and directing them towards proper course selection is the means by which their main interests can constitute the basis for their choices in the undergraduate stage. In this paper we propose and develop a multi- agent-based university advising system for advising undergraduate students instead of the traditional advising method through departments’ advisors. This system aims at assisting undergraduate students of the Information System (IS) major at the Arab Academy for Science, Technology and Maritime Transport (AAST) to select the suitable courses during their undergraduate program. The proposed system enables students to select suitable courses for each semester without the need to consult advisors. Moreover, it takes into account course prerequisites and priorities. Java language, JADE platform and oracle 11g database are used to implement the system. As anticipated, the findings revealed that most of the undergraduate students who tested the system were very satisfied, as the results issued by the proposed system were found to be compatible to a large extent with the views of academic advisors.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Model for Service Response Time in Distributed Systems 分布式系统服务响应时间分析模型
2014 24th International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2014-10-25 DOI: 10.1109/ICCTA35431.2014.9521610
Abdulhalim Dandoush, M. Elgamel
{"title":"Analytical Model for Service Response Time in Distributed Systems","authors":"Abdulhalim Dandoush, M. Elgamel","doi":"10.1109/ICCTA35431.2014.9521610","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521610","url":null,"abstract":"Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such distributed systems rely on data fragmentation and distributed storage of data over multiple peers. Files are usually partitioned into fixed-size blocks that are themselves partitioned into fragments. In such systems, some peers (clients) exploit the power of parallelism to download blocks/fragments of data stored in a distributed way over some other peers (servers). This idea is deployed even over a network of servers (mirrors and cache) to reduce download time. Determining response times in parallel downloading with capacity constraints on both the client downloads and server uploads is then an important measure of the quality of the service given by these systems. This download time depends on the throughput of the different connections created to obtain the fragments of the given file. This paper enriches the literature with a simple stochastic model of the download process in such large and complex systems. In particular, it characterizes the response time performance metric and assesses its expectation through Markovian model and validates the study through the packet level Network Simulator NS-2. The relative error between the numerical results of the proposed model and the result of the simulation is reported. The comparison shows that the Model characterizes with high accuracy the response time under realistic assumptions.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信