2011 7th International Conference on Emerging Technologies最新文献

筛选
英文 中文
QoS-aware device selection using user preferences for tasks in ubiquitous environments 在无处不在的环境中使用用户首选项进行qos感知设备选择
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048484
M. E. Ahmed, H. Mukhtar, D. Belaid, J. Song
{"title":"QoS-aware device selection using user preferences for tasks in ubiquitous environments","authors":"M. E. Ahmed, H. Mukhtar, D. Belaid, J. Song","doi":"10.1109/ICET.2011.6048484","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048484","url":null,"abstract":"Ubiquitous environments are characterized by devices that share information with one another. Such environments can be created dynamically by creating association between devices at runtime. This association requires selection of services on these devices, a technique known as service composition. The existing service composition approaches are mostly restricted to service matching and consider functional aspects of the association only. We propose a QoS-aware device selection in the ubiquitous environment, but also integrating user-preferences with QoS by taking into account network heterogeneity (variety of access technologies). We search for the nearly optimal solution among a number of candidate solutions of service composition that maximizes QoS parameters and user-preferences specified by user keeping in view network heterogeneity.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"46 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Position-based and geocast routing protocols in VANETs VANETs中基于位置和地理广播的路由协议
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048483
Huma Ghafoor, K. Aziz
{"title":"Position-based and geocast routing protocols in VANETs","authors":"Huma Ghafoor, K. Aziz","doi":"10.1109/ICET.2011.6048483","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048483","url":null,"abstract":"We study position-based and geocast routing protocols, which are two categories of Vehicular Ad-hoc Network (VANETs) routing protocols based on the information of position and location respectively. Two scenarios for position-based routing are discussed — the highway scenario and the city scenario. We also study geocast routing protocols that are based on flooding by defining the forwarding zone. Forwarding zone is the region where the destination node is located. The advantages and challenges for these position-based and geocast routing protocols are also discussed followed by a discussion on the suitability of the position-based protocols for the highway and city scenarios.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124391497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Threat modeling using formal methods: A new approach to develop secure web applications 使用形式化方法的威胁建模:一种开发安全web应用程序的新方法
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048492
Shafiq Hussain, H. Erwin, P. Dunne
{"title":"Threat modeling using formal methods: A new approach to develop secure web applications","authors":"Shafiq Hussain, H. Erwin, P. Dunne","doi":"10.1109/ICET.2011.6048492","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048492","url":null,"abstract":"Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software systems. Software security has gained attention in the recent years as an internal security issue of software systems as compared to external protective measures. Threat modeling is a technique being used to model threats into software systems. By applying threat modeling at the early stages of software development life cycle, all possible threats to software systems can be identified and mitigated and hence in this way, a more secure software application can be developed. Various threat modeling approaches such as CLASP, SDL, STRIDE, DREAD, TAM and Touch Points are being used by many organizations for threat modeling into software systems. But all of the approaches being used for threat modeling are based on informal and semi formal techniques. Formal methods are based on mathematics and provide state of the art techniques for secure software development. Formal methods had been used successfully in many critical systems such as CICS, Paris Railway System and British Air Traffic Control System etc. In the proposed approach VDM++, will be used for specification of core components: STRIDE, DREAD and Security Mechanisms. VDM++Tools will be used for type checking and proof obligations.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Activity-based correlation of personal documents and their visualization using association rule mining 基于活动的个人文档关联及其使用关联规则挖掘的可视化
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048448
Zafar Saeed, Abida Sadaf, Siraj Muhammad
{"title":"Activity-based correlation of personal documents and their visualization using association rule mining","authors":"Zafar Saeed, Abida Sadaf, Siraj Muhammad","doi":"10.1109/ICET.2011.6048448","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048448","url":null,"abstract":"It is a common observation nowadays that the personal information of user is difficult to manage, the material which is copied by the users to their personal system are often forgotten by the users. So when they require their information it becomes very difficult to find the relevant information from huge repository. We have introduced a method using which the activities of user for reading documents are captured from running process list and managed in a dataset along with accessing time, then frequent item set and associated weights are calculated for each document with other using Apriori Algorithm and confidence measure in conjunction with combined access time. When user searches a document, the document list appears using any conventional model of retrieval, we have used primary metadata including title, author, type for document searching. Beside this, a visual interface is designed to display the list correlated document on the basis of users activities may help them to indentify documents according to their past activities.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124113884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Block Aging Prevention technique (BAP) for flash based Solid State Disks 基于闪存的固态硬盘块老化预防技术(BAP)
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048453
S. Shiraz, Anam Zaman, Saba Zia, Abdullah Mansoor, Farooq Ahmed
{"title":"Block Aging Prevention technique (BAP) for flash based Solid State Disks","authors":"S. Shiraz, Anam Zaman, Saba Zia, Abdullah Mansoor, Farooq Ahmed","doi":"10.1109/ICET.2011.6048453","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048453","url":null,"abstract":"Solid State Disks (SSDs) are becoming increasingly popular due to enhancement in speed and reduction in size, power and cost. It is an obvious choice for many applications including personal computers, embedded systems, medical and healthcare devices etc. However, the reliability of SSD has now become a critical issue and this is an area of active research. SSD uses Flash technology which is a fast, efficient nonvolatile storage chip and offers cost-effective solution for SSDs. However, with all these features, flash memory defines a limit of write-erase on its blocks. Wearleveling policies extend SSD life time by ensuring even wearleveling of the blocks in a flash memory. Several algorithms have been proposed to improve wearleveling of SSD including Hot-Cold Swapping, Dual pool Algorithm (DP), Kim and Lee algorithm (KL) and Cost Age and Times Algorithm (CAT). This paper discusses all these wearleveling policies and introduces a Block Aging Prevention (BAP) technique which has been tested on 8Gb Flash. The comparison of all these algorithms show that the proposed technique has reduced the erasure count deviation of NAND flash blocks by 6.71% and 20% compared to DP and CAT respectively. It has also reduced overhead by 4% comparatively to DP.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient outlier detection in WSNs based on temporal and attribute correlations 基于时间和属性相关性的wsn节能离群点检测
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048470
N. Shahid, I. Naqvi
{"title":"Energy efficient outlier detection in WSNs based on temporal and attribute correlations","authors":"N. Shahid, I. Naqvi","doi":"10.1109/ICET.2011.6048470","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048470","url":null,"abstract":"Support vector machines (SVM) have formulated the main concepts of machine learning, ever since their introduction. The one-class quarter sphere SVM has received recent interest, as it extends the concepts of machine learning to the domain of linear optimization problems with cost efficiency. This paper deals with the novel idea of a quarter-sphere SVM based only on temporal-attribute correlations. To avoid communication overhead the system complexity at individual sensor nodes is slightly increased. The outlier and event detection rate keeps up with the detection rate obtained via previous approaches with an added advantage of no communication cost.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Scattering parameter measurements of infinite tunable reflectarrays 无限可调反射射线的散射参数测量
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048488
M. Inam, M. Ismail
{"title":"Scattering parameter measurements of infinite tunable reflectarrays","authors":"M. Inam, M. Ismail","doi":"10.1109/ICET.2011.6048488","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048488","url":null,"abstract":"This paper presents a simple and effective technique for the scattering parameter measurements of infinite tunable reflectarrays in X-band frequency range. Tunable reflectarrays have been designed by using different types of slot configurations embedded in the patch elements. The scattering parameter measurements have been carried out using waveguide simulator technique and the measured results are found out to be in close agreement with the analysis carried out using Finite Element Method (FEM) and Finite Integral Method (FIM) techniques. A maximum change of 17% (10GHz to 8.3GHz) in the resonant frequency has been demonstrated by using rectangular and circular slots. Furthermore the achievable dynamic phase range of 314° demonstrates a feasibility of employing the proposed slot configurations for the design of active tunable reflectarray antennas.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117110779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantitative analysis of State-of-the-Art synchronizers: Clock domain crossing perspective 最新同步器的定量分析:时钟域交叉透视
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048485
N. Sharif, N. Ramzan, F. Lodhi, O. Hasan, S. R. Hasan
{"title":"Quantitative analysis of State-of-the-Art synchronizers: Clock domain crossing perspective","authors":"N. Sharif, N. Ramzan, F. Lodhi, O. Hasan, S. R. Hasan","doi":"10.1109/ICET.2011.6048485","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048485","url":null,"abstract":"Reliable transferring of data from one clock domain to another requires synchronization. Therefore, synchronizers play an important role in clock domain crossing (CDC). But despite their wide applications, there is no standard quantitative metric available to analyze various synchronizer configurations on common grounds. To overcome this limitation, this paper presents a comparison of three basic and widely used synchronizers. Latency and power consumption metric are measured for level, edge-detecting and pulse generating synchronizers. Furthermore, effects of these synchronizers are studied when applied to some commonly used asynchronous handshaking protocols under 90nm CMOS technology.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Malfree web server response 错误的web服务器响应
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048478
Mahmood Ahmad, Rana Faisal Munir
{"title":"Malfree web server response","authors":"Mahmood Ahmad, Rana Faisal Munir","doi":"10.1109/ICET.2011.6048478","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048478","url":null,"abstract":"The trend of spreading malicious web contents through legitimate but compromised websites is not very rare to find. Websites bearing the trust of millions of clients are chosen to exploit the trust of its users by installing unwanted and malevolent contents on client machines through drive by download. This stealthier mechanism is aimed to convert a client machine into a botnet and to gain access on its resources like stored passwords, sensitive information and fingerprinting of running softwares. To deal with it, there are different solutions like honeypots and system state observers but all these antidotes are client resident. In this paper we have devised a heuristic based solution which resides on web servers and circumvents the movement of malicious contents toward client machines while keeping the server repute trusted and its availability 24/7 even after the compromise. Instead of blocking the complete website or any of its page, only malevolent contents are sanitized which adds novelty to the proposed system.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithmic transformation for FPGA implementation of high throughput filters 一种用于FPGA实现高吞吐量滤波器的算法转换
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048450
H. M. Kamboh, S. Khan
{"title":"An algorithmic transformation for FPGA implementation of high throughput filters","authors":"H. M. Kamboh, S. Khan","doi":"10.1109/ICET.2011.6048450","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048450","url":null,"abstract":"This paper proposes novel design methodologies for generating feed forward and recursive architectures for optimal mapping on Field Programmable Gate Arrays (FPGAs). The new methodology keeps in perspective the architecture of FPGA, structural design of logic blocks, their interconnectivity and available special purpose embedded blocks during filter transformation. Higher throughput is achieved through selective application of different transformations, taking into consideration limited pipelining options of these embedded blocks and general construction of FPGA slice fabric. The paper demonstrates the methodology and shows its applicability by synthesizing the designs and comparing the results that show improved performance as compared to traditional designs.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131170583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信