2011 International Conference on Innovations in Information Technology最新文献

筛选
英文 中文
A novel location service protocol in multi-hop clustering vehicular ad hoc networks 一种新的多跳集群车载自组网位置服务协议
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893855
L. Zhang, H. Elsayed, E. Barka
{"title":"A novel location service protocol in multi-hop clustering vehicular ad hoc networks","authors":"L. Zhang, H. Elsayed, E. Barka","doi":"10.1109/INNOVATIONS.2011.5893855","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893855","url":null,"abstract":"This paper presents a novel multi-hop cluster architecture for location service protocol in vehicular ad hoc networks, which is able combine the connectivity between vehicles and the vehicle mobility to select cluster head with the tradeoff between the communication overheads and the vehicle locations. This proposed scheme is a fast convergent and load balance approach that is able to offer significant improvement on scalability and reliability for vehicular ad hoc network. Since vehicle mobility has been taken into account in terms of average link expiration time, the cluster constructed by this proposed approach becomes stable since cluster-head life-time can be increased up to 50% comparing to other existing clustering schemes in vehicular ad hoc network.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Thresholding using Quantum-dot Cellular Automata 利用量子点元胞自动机进行阈值分割
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893848
B. Sen, Anshu S. Anand, Tanumoy Adak, B. Sikdar
{"title":"Thresholding using Quantum-dot Cellular Automata","authors":"B. Sen, Anshu S. Anand, Tanumoy Adak, B. Sikdar","doi":"10.1109/INNOVATIONS.2011.5893848","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893848","url":null,"abstract":"Quantum-dot Cellular Automata(QCA), a promising alternative to CMOS technology, can provide a powerful and efficient computing platform for image processing which has heavy computational requirements. Image thresholding is one such image processing technique that plays a significant role in applications of image segmentation for its intuitive properties and simplicity. This work proposes an efficient architecture to carry out thresholding in image processing. It is developed around QCA technology and provides significant improvement over the existing approach.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A method for solving the cold start problem in recommendation systems 一种解决推荐系统冷启动问题的方法
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893824
Ossama H. Embarak
{"title":"A method for solving the cold start problem in recommendation systems","authors":"Ossama H. Embarak","doi":"10.1109/INNOVATIONS.2011.5893824","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893824","url":null,"abstract":"Recommendation systems become essential in web applications that provide mass services, and aim to suggest automatic items (services) of interest to users. The most popular used technique in such systems is the collaborative filtering (CF) technique, which suffer from some problems such as the cold-start problem, the privacy problem, the user identification problem, the scalability problem, etc. In this paper, we address the cold-start problem by giving recommendations to any new users who have no stored preferences, or recommending items that no user of the community has seen yet. While there have been lots of studies to solve the cold start problem, but it solved only item-cold start, or user-cold start, also provided solutions still suffer from the privacy problem. Therefore, we developed a privacy protected model to solve the cold start problem (in both cases user and item cold start). We suggested two types of recommendation (node recommendation and batch recommendation), and we compared the suggested method with three other alternative methods (Triadic Aspect Method, Naïve Filterbots Method, and MediaScout Stereotype Method), and we used dataset collected from online web news to generate recommendations based on our method and based on the other alternative three methods. We calculated level of novelty, coverage, and precision. We found that our method achieved higher level of novelty in the batch recommendation whilst it achieved higher levels of coverage and precision in the node recommendations technique comparing to these three methods.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Evaluation of security methods for ensuring the integrity of digital evidence 评估确保数字证据完整性的安全方法
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893821
S. Saleem, O. Popov, Rami Dahman
{"title":"Evaluation of security methods for ensuring the integrity of digital evidence","authors":"S. Saleem, O. Popov, Rami Dahman","doi":"10.1109/INNOVATIONS.2011.5893821","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893821","url":null,"abstract":"The omnipresence of e-services running on various instances of pervasive e-infrastructures that are fundamental to the contemporary information society generates an abundance of digital evidence. The evidence in a digital form stems from a myriad of sources ranging from stand alone computers and their volatile and non-volatile storages, to mobile small scale digital devices, network traffic, ever-present applications comprising social networks, ISP records, logs, Web pages, databases and both global and local information systems. The acquisition and the analysis of this evidence is crucial to understanding and functioning of the digital world, regardless of the positive or negative implications of the actions and the activities that generated the evidence. In the case of the later, when the evidence comes from illegal, illicit and malicious activities, the protection of digital evidence is of major concern for the law enforcement and legal institutions, namely for investigators and prosecutors. To protect the integrity of the digital evidence, a number of security methods are used. These methods differ in terms of performance, accuracy, security levels, computational complexity, potential errors and the statistical admissibility of the produced results, as well as the vulnerabilities to accidental or malicious modifications. The work presented deals with the evaluation of these security methods in order to study and understand their “goodness” and suitability to protect the integrity of the digital evidence. The immediate outcome of the evaluation is a set of recommendations to be considered for selecting the right algorithm to protect integrity of the digital evidence in general.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130268620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Low leakage power SRAM cell for embedded memory 用于嵌入式存储器的低泄漏功率SRAM单元
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893851
B. Mohammad
{"title":"Low leakage power SRAM cell for embedded memory","authors":"B. Mohammad","doi":"10.1109/INNOVATIONS.2011.5893851","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893851","url":null,"abstract":"Leakage power becomes big percentage of total active power especially for small geometry CMOS technology. It is estimated that 20–50% of total average power during normal operation lost to leakage power. Leakage power is even more important for mobile devices where ideal time is long and battery life is important. This paper presents a low leakage SRAM cell and array architecture targeting high performance, low power embedded memory. The proposed novel 7-Transistor (7T) based memory provides 50% lower leakage power compare to 8T cell and 30% faster access time than traditional 6-Transistor (6T) SRAM cell with increased area of 20% compared to the compact 6T cell. All comparisons are based on 28nm foundry low power process technology.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126140811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network coding with multi-generation mixing for scalable and non-scalable video communication 用于可扩展和不可扩展视频通信的多代混合网络编码
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893857
Mohammed D. Halloush, H. Radha
{"title":"Network coding with multi-generation mixing for scalable and non-scalable video communication","authors":"Mohammed D. Halloush, H. Radha","doi":"10.1109/INNOVATIONS.2011.5893857","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893857","url":null,"abstract":"Network coding with multi-generation mixing (MGM) has been proposed as a generalized approach for practical network coding [6]. Our goal in this paper is to evaluate the improvements achieved by MGM network coding on the quality of recovered video in packet loss networks. The improvements of network coding are clear in wireless networks due to the opportunities of enhancing bandwidth utilization. This makes MGM network coding appropriate for video communication over wireless networks. In this paper MGM is applied on scalable as well as non-scalable video. MGM deployment in the case of scalable video differs from that in the case of non-scalable video. After explaining the way MGM is applied, we evaluate the performance with extensive simulations in a wireless network setup. Results indicate major improvements in network coding decodable rates and enhancement in the quality of recovered video with MGM.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Incremental learning approach for human detection and tracking 用于人体检测和跟踪的增量学习方法
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893802
B. Ammar, A. Wali, A. Alimi
{"title":"Incremental learning approach for human detection and tracking","authors":"B. Ammar, A. Wali, A. Alimi","doi":"10.1109/INNOVATIONS.2011.5893802","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893802","url":null,"abstract":"Human detection is a key functionality to reach Human Robot/Computer Interaction. The human tracking is also a rapidly evolving area in computer and robot vision; it aims to explore and to follow human motion. We present in this article an intelligent system to learn human detection. The descriptors used in our system make up the combination of HOG and SIFT that capture salient features of humans automatically. Additionally, an incremental PCA is employed to follow the detected humans. Experimental results have been extracted for a set of sequences with standing and moving people at different positions and with a variation of backgrounds.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134286562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A view on latest audio steganography techniques 最新音频隐写技术综述
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893859
Fatiha Djebbar, B. Ayad, H. Hamam, K. Abed-Meraim
{"title":"A view on latest audio steganography techniques","authors":"Fatiha Djebbar, B. Ayad, H. Hamam, K. Abed-Meraim","doi":"10.1109/INNOVATIONS.2011.5893859","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893859","url":null,"abstract":"Steganography has been proposed as a new alternative technique to enforce data security. Lately, novel and versatile audio steganographic methods have been proposed. A perfect audio Steganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in digital audio steganography is to obtain robust high capacity steganographic systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has led to great diversity in the existing steganographic techniques. In this paper, we present a current state of art literature in digital audio steganographic techniques. We explore their potentials and limitations to ensure secure communication. A comparison and an evaluation for the reviewed techniques is also presented in this paper.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133277480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
A survey on firewall's early packet rejection techniques 防火墙早期包拒绝技术综述
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893818
S. Zeidan, Z. Trabelsi
{"title":"A survey on firewall's early packet rejection techniques","authors":"S. Zeidan, Z. Trabelsi","doi":"10.1109/INNOVATIONS.2011.5893818","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893818","url":null,"abstract":"Packet filtering plays a critical role in the performance of many network devices such as firewalls, routers and intrusion detection and prevention systems. Tremendous amount of research works on packet classification was proposed to optimize packet filtering. However, most works use deterministic techniques and do not take into consideration the traffic characteristics. Moreover, most packet classifiers give no specific consideration for optimizing early packet rejection (compared with packet acceptance), which is very important for improving firewall performance. In this paper, we are limited to survey firewall early packet rejection techniques. The strengths and limitations of the techniques are discussed. Also, some improvements have been proposed. This work can be the basis to enhance these techniques or for proposing new approaches that provide better firewall performance.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Preventing shoulder-surfing when selecting pass-images in challenge set 在挑战集中选择传球图像时防止肩部冲浪
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893865
S. Jebriel, R. Poet
{"title":"Preventing shoulder-surfing when selecting pass-images in challenge set","authors":"S. Jebriel, R. Poet","doi":"10.1109/INNOVATIONS.2011.5893865","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893865","url":null,"abstract":"In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信