2013 11th International Conference on Frontiers of Information Technology最新文献

筛选
英文 中文
TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks TrustBook:在线社交网络中基于信任的关系建立
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.48
Umara Noor, Z. Anwar, Y. Mehmood, Waseem Aslam
{"title":"TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks","authors":"Umara Noor, Z. Anwar, Y. Mehmood, Waseem Aslam","doi":"10.1109/FIT.2013.48","DOIUrl":"https://doi.org/10.1109/FIT.2013.48","url":null,"abstract":"Existing online social networks open the doors of socialization for their users by providing a few and easy steps towards user account creation. The major drawback of this feature is that current social network providers lack mechanisms of determining the authenticity of an account. A genuine user's account can be easily forged with fake profile information. There is simply no mechanism to assign or bind any unique identity with user's account that prevents its forged clone to be created on the same network or across multiple networks. One of the intentions of creating a forged account is to deceive the social circle of an individual and compromise their privacy. Accepting a friend's request from a forged account can badly compromise the privacy of an individual. All this can occur to the victim in a very short span of time before she discovers this attack and remove the fake identity holder from her friend's list. To tackle with the issue of identity theft and determining genuine user accounts in online social networks, we present in this paper a novel and real world's trust based approach for verifying the legitimacy of online social network accounts. We propose to use a verification process that utilizes the use of OpenPGP digital certificates and the web of trust consequently formed by them. We define two stages for our secure design. In the first stage, our approach requires digital certificates to be uploaded on the social network server at the time of user account creation. These digital certificates are verified to restrict forged account creation on the same network and across other social networks. In the second stage, to establish a new connection this digital certificate is sent along with the friend request to the recipient. The recipient verifies its authenticity based on the web of trust associated with that certificate. In order to implement our solution, we developed a social network prototype i.e. Trust Book. We conducted an experiment to evaluate the performance of our work against well know social networking site i.e. Face book by launching forged account attacks on both. There were three performance metrics used in the experiment i.e. applicability, reliability and usability. The observations showed that our approach is applicable to all kinds of interaction scenarios. Also it has a good resilience against profile cloning and other kinds of security attacks including session hijacking, replay and channel jamming.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130493282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimum Microstrip Reflectarray Unit Cell Design for Wide-Band Operation 宽频带操作的最佳微带反射单元设计
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.35
M. Arshad, F. A. Tahir
{"title":"Optimum Microstrip Reflectarray Unit Cell Design for Wide-Band Operation","authors":"M. Arshad, F. A. Tahir","doi":"10.1109/FIT.2013.35","DOIUrl":"https://doi.org/10.1109/FIT.2013.35","url":null,"abstract":"In this paper a unit cell (of a micro strip reflect array antenna) consists of double circular ring element is proposed with enhanced bandwidth and linear reflection phase range. The micro strip reflect array unit cell operates in X Band (8-12 GHz) at the centre frequency of 10 GHz. The design proposed in this paper has a linear reflection phase range which enhances the pattern bandwidth of a micro strip reflect array unit cell. An soft HFSS software is used to carry out a parametric study to confirm the performance of the unit cell. Reflection phase range value of more than 550 degree and a phase slope value of 79 mm at the centre frequency of 10 GHz has been obtained with this unit cell. A pattern bandwidth of up to 24% on frequency band of 8.75 GHz to 11.14 GHz is achieved.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Area under the ROC Curve of Enhanced Energy Detector 增强型能量检测器ROC曲线下面积
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.31
S. S. Khalid, S. Abrar
{"title":"Area under the ROC Curve of Enhanced Energy Detector","authors":"S. S. Khalid, S. Abrar","doi":"10.1109/FIT.2013.31","DOIUrl":"https://doi.org/10.1109/FIT.2013.31","url":null,"abstract":"The area under the Receiver-Operating-Characteristic (ROC) curve of a detector is a simple and suitable figure-of-merit of its detection capability. However the problem of determining the Area-Under-the-Curve (AUC) of an ROC is a non-trivial exercise and hence it has gone usually unnoticed in literature. In this report we analyze the AUC of the recently proposed enhanced energy detector for spectrum sensing. We derive a simple expression for the AUC which can also be applied to determine the AUC of the conventional energy detector as a special case.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterization of Millimeter-Wave Active and Passive Components Embedded in Test Fixtures 嵌入测试装置的毫米波有源和无源元件的特性
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.32
G. Mehdi, Anyong Hu, Z. Cheng, J. Miao, A. Mueed
{"title":"Characterization of Millimeter-Wave Active and Passive Components Embedded in Test Fixtures","authors":"G. Mehdi, Anyong Hu, Z. Cheng, J. Miao, A. Mueed","doi":"10.1109/FIT.2013.32","DOIUrl":"https://doi.org/10.1109/FIT.2013.32","url":null,"abstract":"The performance of millimeter-wave active and passive components is sensitive to the discontinuities associated with the test fixtures. In order to accurately characterize the device-under-test (DUT) and obtain the DUT only performance, the fixture effects must be removed from the overall measurement. Such process is generally referred to as de-embedding. In this work, different de-embedding methods are reviewed and two of these namely the thru-reflect-line (TRL) and the thru-line (TL) are employed to de-embed an edge-coupled band-pass filter (BPF) and a low noise amplifier (LNA) both operating at Ka band. The two DUTs along with the TRL kit are realized on a substrate with dielectric constant of 6.2. Measured results obtained from the two methods are compared.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Clustering Using Discriminant Image Features 基于判别图像特征的图像聚类
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.13
N. Ahmed, A. Jalil
{"title":"Image Clustering Using Discriminant Image Features","authors":"N. Ahmed, A. Jalil","doi":"10.1109/FIT.2013.13","DOIUrl":"https://doi.org/10.1109/FIT.2013.13","url":null,"abstract":"Manifold learning based image clustering models are usually employed at local level to deal with images sampled from nonlinear manifold. Usually, gray level image features are used that are obtained by resizing original images through linear interpolation approach. However, significant image variance information is lost in gray level image features. Clustering models that are based on discriminant analysis can be made more effective in principal component analysis (PCA) space whereas leading projection vectors contain significant image variance information. For optimal clustering performance, we used two-dimensional two-directional PCA technique to extract significant image features. We report clustering performance of Spectral Embedded Clustering (SEC) model using discriminant image features on 6 benchmark image databases. Clustering performance is compared with existing state-of-art clustering approaches. Significant overall performance improvement is observed using proposed discriminant image features over gray level image features.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interactive Control through Hand Gestures 通过手势进行交互控制
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.23
N. Qureshi, Ijaz Akhter
{"title":"Interactive Control through Hand Gestures","authors":"N. Qureshi, Ijaz Akhter","doi":"10.1109/FIT.2013.23","DOIUrl":"https://doi.org/10.1109/FIT.2013.23","url":null,"abstract":"In recent years, we have seen dramatic progress in motion capture techniques for digital character animation, yet these techniques are expensive due to the need of special hardware. Keeping in view the trend of making applications interactive and more natural and intuitive, as well as keeping the cost low, a vision-based system is developed to allow interactive control of applications, using hand gestures. The system is used for two types of applications: skeleton animation and image editing. The procedure steps mainly consist background subtraction, fingertips detection, tracking, and mapping of finger lengths to control parameters. For skeleton animation application, finger lengths are mapped to joint angles. For image editing application, finger lengths are mapped to parameters such as rotation angle of image or parameters for image cropping. In addition to the idea of using hand gestures for skeleton animation and image editing, we have introduced a novel method for detecting fingertips, in which the hand contour is traversed and a turning point is found using trailing buffer.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"83 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Feature Selection and Tumor Identification in Brain MRI Using Swarm Intelligence 基于群体智能的脑MRI混合特征选择与肿瘤识别
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.17
A. Rehman, Aasia Khanum, A. Shaukat
{"title":"Hybrid Feature Selection and Tumor Identification in Brain MRI Using Swarm Intelligence","authors":"A. Rehman, Aasia Khanum, A. Shaukat","doi":"10.1109/FIT.2013.17","DOIUrl":"https://doi.org/10.1109/FIT.2013.17","url":null,"abstract":"Demand for automatic classification of Brain MRI (Magnetic Resonance Imaging) in the field of Diagnostic Medicine is rising. Feature Selection of Brain MRI is critical and it has a great influence on the classification outcomes, however selecting optimal Brain MRI features is difficult. Particle Swarm Optimization (PSO) is an evolutionary meta-heuristic approach that has shown great potential in solving NP-hard optimization problems. In this paper MRI feature selection is achieved using Discrete Binary Particle Swarm Optimization (DBPSO). Classification of normal and abnormal Brain MRI is carried out using two different classifiers i.e. Support Vector Machine (SVM) and K-Nearest Neighbor (KNN). Experimental results show that the proposed approach reduces the number of features and at the same time it achieves high accuracy level. PSO-SVM is observed to achieve high accuracy level using minimum number of selected features.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
UWB Antenna with Notches at WLAN Bands 在WLAN频段带陷波的UWB天线
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.39
Taimoor Naeem, F. A. Tahir, A. Najam
{"title":"UWB Antenna with Notches at WLAN Bands","authors":"Taimoor Naeem, F. A. Tahir, A. Najam","doi":"10.1109/FIT.2013.39","DOIUrl":"https://doi.org/10.1109/FIT.2013.39","url":null,"abstract":"An ultra-wideband antenna has been proposed in this paper, which rejects WLAN bands to suppress the interference. Dual notch is achieved at the upper and lower WLAN bands by removing U and inverted-L slot. By varying the parameters of slots desired rejected band and notch position is achieved. The proposed antenna size is 30x30 mm2 is fed by 50 ohm micro strip transmission line. Partial ground plane and stair case radiating patch is used for matching between transmission line and radiating patc. The notch at the lower and upper WLAN band is successfully achieved with maximum gain of 5.2 dBi.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating the Effect of Malicious Users in Cognitive Networks 减轻认知网络中恶意用户的影响
A. Aisha, Junaid Qadir, A. Baig
{"title":"Mitigating the Effect of Malicious Users in Cognitive Networks","authors":"A. Aisha, Junaid Qadir, A. Baig","doi":"10.1109/FIT.2013.9","DOIUrl":"https://doi.org/10.1109/FIT.2013.9","url":null,"abstract":"Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied channel needlessly. As a result, network resources are unfairly monopolized by malicious users denying other secondary users their fair share. In this paper, we introduce a cross-layered approach to provide secondary users the ability to differentiate between a primary user and a malicious user, using Hidden Markov Model at MAC layer. Hence, our proposed framework allows the transport layer protocol to respond appropriately in a way that the effect of the presence of malicious user on the network is mitigated. The effectiveness of our proposed approach is shown by calculating the throughput of the network and number of channel switches with respect to varying number of secondary and malicious nodes and by comparing it to an earlier proposed TCP protocol.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125536908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-commerce in Pakistan: Growth Potentials and E-payment Solutions 巴基斯坦的电子商务:增长潜力和电子支付解决方案
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.52
W. A. Khan, Shahid Yousaf, N. A. Mian, Zubair Nawaz
{"title":"E-commerce in Pakistan: Growth Potentials and E-payment Solutions","authors":"W. A. Khan, Shahid Yousaf, N. A. Mian, Zubair Nawaz","doi":"10.1109/FIT.2013.52","DOIUrl":"https://doi.org/10.1109/FIT.2013.52","url":null,"abstract":"In Pakistan, millions of people have access to internet and now it has become essential part of their lives. It is now a driving force for innovation of all industries. After arrival of wireless service providers, internet users are growing rapidly. On the other hand, internet is still just a source of information sharing and social interaction. Its role in trade and business is limited. Some business organizations have adopted partial ecommerce solutions but no pure-ecommerce business model is implemented throughout the country. E-Commerce plays an important role in economic development. It reduces cost of products and services and creates new job opportunities. Major obstacles in the way of ecommerce in Pakistan are absence of cyber law, poverty, illiteracy and lack of infrastructure. Apart from these, the most challenging one is lack of suitable electronic payments system. Existing systems are either unavailable in Pakistan or not suitable for local entrepreneurs. In this paper, current potentials for ecommerce growth are explored and a new protocol \"Dual-Network E-Payments Protocol\" is proposed. Protocol is based on combination of IP and GSM networks. It satisfies all desired characteristics of e-payment mechanism. The protocol is quite secure, trust worthy and suitable for local infrastructure.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124084700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信