2007 International Conference on Information and Emerging Technologies最新文献

筛选
英文 中文
Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards' “方便使用的智能卡远端用户认证方案”的进一步密码分析
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381318
M.K. Khan
{"title":"Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards'","authors":"M.K. Khan","doi":"10.1109/ICIET.2007.4381318","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381318","url":null,"abstract":"Recently, Wu and Chieu proposed 'a user friendly remote user authentication scheme with smart cards'. We point out that their scheme is vulnerable and susceptible to the attacks and can easily be cryptanalyzed. Their scheme provides only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Their scheme also suffers from the impersonation attack and an adversary can easily impersonate a valid user. Furthermore, we describe that an adversary can login into the system by copying the data of stolen or lost smart card of a legitimate user. Moreover, we discuss that Wu and Chieu's scheme has poor reparability, which makes it infeasible to implement.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trust based Security Framework for Pure AODV Network 基于信任的纯AODV网络安全框架
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381316
I. Raza, S.A. Hussain
{"title":"A Trust based Security Framework for Pure AODV Network","authors":"I. Raza, S.A. Hussain","doi":"10.1109/ICIET.2007.4381316","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381316","url":null,"abstract":"This paper presents a trust based security framework to identify malicious nodes in ad hoc on-demand distance vector (AODV) protocol. In this framework each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than a predefined threshold value, it is identified as malicious and it is not considered for route selection. The proposed security framework does not use any key distribution process and no changes are made in control packets of AODV. Simulation results show that the proposed framework improves performance of AODV by identifying and removing malicious nodes. Performance of the framework has been evaluated for three different types of malicious attacks (impersonation attack, colluding nodes attack and black hole attack).","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Hybrid Feature Selection Approach for Natural Language Call Routing Systems 自然语言呼叫路由系统的混合特征选择方法
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381322
S. Ullah, F. Karray
{"title":"Hybrid Feature Selection Approach for Natural Language Call Routing Systems","authors":"S. Ullah, F. Karray","doi":"10.1109/ICIET.2007.4381322","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381322","url":null,"abstract":"Call routing based on natural language identification is an important issue for call centres operating in a multilingual scenario. This is due to the fact that it is not possible for a human agent to become fluent in all languages. In this paper, we propose a call routing system based on prosodic and phonetic features to improve the performance of automatic call routing systems. The main focus of this paper is to propose a feature set that efficiently improves the performance of the system without incorporating several sets of features. Our proposed approach for combining the prosodic and phonetic features achieves an accuracy rate of 98.36% for a binary language identification call routing system.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Technology (IT) Industry trends and adaptation of Capability Maturity Model Integration (CMMI) practices in Pakistan 巴基斯坦信息技术(IT)行业趋势和能力成熟度模型集成(CMMI)实践的适应
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381327
T. Noor, J. Ahmad, I. Zafar
{"title":"Information Technology (IT) Industry trends and adaptation of Capability Maturity Model Integration (CMMI) practices in Pakistan","authors":"T. Noor, J. Ahmad, I. Zafar","doi":"10.1109/ICIET.2007.4381327","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381327","url":null,"abstract":"Pakistan's software industry is quite young as compare to the developed world and particularly in comparison with India. This report presents different statistics about Pakistan's software industry; especially current number of Software-Capability Maturity Model (SW-CMM) / Capability Maturity Model Integration (CMMI) appraisals and efforts made by different institutions like Pakistan Software Export Board (PSEB), Ministry of IT and Pakistan Software Houses Association (PASHA). This study shows that even after introducing attractive incentives and packages by PSEB and Ministry of IT, Pakistan's IT industry is still moving slowly towards adopting the CMMI framework. The reason for this is being highlighted in this paper after a comprehensive study on the topic and software industry's data analysis. On the basis of this analysis few recommendations are also made.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synergy in USAR Robotics USAR机器人的协同作用
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381336
H. Sadeghi, H. Bastani
{"title":"Synergy in USAR Robotics","authors":"H. Sadeghi, H. Bastani","doi":"10.1109/ICIET.2007.4381336","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381336","url":null,"abstract":"This paper presents an approach for design and implementation of cooperative rescue robots. The objective is to implement robots making search and rescue (SAR) action safe and easy. The approach is based on two robots, the latter fast and agile to take a general view of disaster area, the former well-equipped to explore surrounding details. However the robots are quite different in appearance and capabilities, but they accomplish the SAR task with a close synergy. Abilities of remotely detecting victims, using non-touch sensors, interactive user friendly control interface and following a planned trajectory to guide towards the victims are main facts of the prosperous SAR. Different parts of the synergetic system, robots; sensors, hardware, control interface, mapping and localization are introduced throughout the paper.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optical Fiber Connector Surface Defect Detection Using Wavelets 基于小波的光纤连接器表面缺陷检测
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381337
A. Rehman, W. Bin Mozaffar
{"title":"Optical Fiber Connector Surface Defect Detection Using Wavelets","authors":"A. Rehman, W. Bin Mozaffar","doi":"10.1109/ICIET.2007.4381337","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381337","url":null,"abstract":"In this paper, a wavelet-based surface defect detection of optical fiber ferrules is proposed. Surface defects on optical fiber connectors can be damaging to passing signals when coupled with other connectors. Our quality control enhancement work is a visual control stage, using magnified images, whereby morphological operations segment the image and wavelet transforms then detect defects on optical fiber connector surfaces to improve the overall acceptability of the manufactured components.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speaker Accent Classification System Using a Fuzzy Gaussian Classifier 基于模糊高斯分类器的说话人口音分类系统
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381302
S. Ullah, F. Karray
{"title":"Speaker Accent Classification System Using a Fuzzy Gaussian Classifier","authors":"S. Ullah, F. Karray","doi":"10.1109/ICIET.2007.4381302","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381302","url":null,"abstract":"A speaker's accent is the most important factor affecting the performance of automatic speech recognition (ASR) systems. This is due to the fact that accents vary widely, even within the same country or community. The reason may be attributed to the fuzziness between the boundaries of phoneme classes, a result of differences in a speaker's vocal tract and accent. In this paper, a new method of accent classification is proposed that is based on fuzzy Gaussian mixture models (FGMMs). The proposed method first uses a fuzzy clustering to fuzzily partition the data. In this way, fuzzy memberships to the cluster centres are determined by minimizing the distance between the cluster centres and feature vectors. Afterwards, a GMM classifier is trained by using the fuzzy Gaussian parameters to classify the speaker's accent. The experimental results show that the proposed method outperforms the Gaussian Mixture models, Vector Quantization modeling method, Hidden Markov Model, and Radial Basis Neural Networks.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of IEEE 802.15.4 Based IPMAC Network 基于IEEE 802.15.4的IPMAC网络性能评估
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381310
T. Haider, M. Yusuf
{"title":"Performance Evaluation of IEEE 802.15.4 Based IPMAC Network","authors":"T. Haider, M. Yusuf","doi":"10.1109/ICIET.2007.4381310","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381310","url":null,"abstract":"Wireless adoption in industries is gaining momentum. With the recent development on the standardization front by virtue of IEEE 802.15.4 (Zigbee), the critical task of industrial process monitoring and control can be undertaken wirelessly. This switching over to wireless is, however, in the investigative stages with a few early adoptions in the industry. This work studies the performance of an IEEE 802.15.4 based IPMAC network using star topology in a simulated environment. Results so obtained have been analyzed. General recommendations have been made regarding issues pertaining to time criticality and packet loss.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CFiTT - corrupt free file transfer technique CFiTT -腐败免费文件传输技术
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-01 DOI: 10.1109/ICIET.2007.4381319
A. Sultana, M.F. Bashir, M. Qadir
{"title":"CFiTT - corrupt free file transfer technique","authors":"A. Sultana, M.F. Bashir, M. Qadir","doi":"10.1109/ICIET.2007.4381319","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381319","url":null,"abstract":"Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信