2013 11th International Conference on Frontiers of Information Technology最新文献

筛选
英文 中文
Modified VIKOR Based Distributed Clustering Scheme for Wireless Sensor Networks 基于改进VIKOR的无线传感器网络分布式聚类方案
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.53
Tauseef Shah, M. Mustafa, Syed Hassan Ahmed, S. Bouk, Dongkyun Kim
{"title":"Modified VIKOR Based Distributed Clustering Scheme for Wireless Sensor Networks","authors":"Tauseef Shah, M. Mustafa, Syed Hassan Ahmed, S. Bouk, Dongkyun Kim","doi":"10.1109/FIT.2013.53","DOIUrl":"https://doi.org/10.1109/FIT.2013.53","url":null,"abstract":"Stability and lifetime of Wireless Sensor Networks (WSNs) mainly depend on energy of each node in the network. Hence, it is necessary for a WSN to be energy efferent. There are different methods to preserve energy in WSNs and clustering is one of those methods. Clustering techniques divide whole network into small blocks, each having a managing node, called cluster head (CH) and rest of the nodes within that block act as members. In this paper, we propose a distributed clustering scheme, called Modified VIKOR model based Clustering (MVC) protocol. This technique uses multiple criteria i.e. residual energy, node degree, distance to the base station and average distance between a node and its neighbors, to select a cluster head. Each node shares those parameters within its transmission range and decides which CH is suitable within that region. Modified VIKOR method is used to outrank the potential nodes as CHs by considering the conflicting criteria. The realistic multi-hoping communication model is used in both, inter-cluster and intra-cluster communication, instead of single hop as in previous schemes. Simulation results show that our purposed technique performs much better than those previous methods in terms of energy efficiency, network life time, less CH deformation and control overhead.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132236130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Content Based Image Retrieval Using Localized Multi-texton Histogram 基于内容的局部多文本直方图图像检索
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.27
Muhammad Younas Qazi, M. S. Farid
{"title":"Content Based Image Retrieval Using Localized Multi-texton Histogram","authors":"Muhammad Younas Qazi, M. S. Farid","doi":"10.1109/FIT.2013.27","DOIUrl":"https://doi.org/10.1109/FIT.2013.27","url":null,"abstract":"This paper presents a simple yet efficient image retrieval technique that defines image feature descriptors using localized multi-texton histogram. The proposed technique extracts a unique feature vector for each image in the image database based on its shape, texture and color. First, the image is divided into smaller equal size blocks and then for each block texture orientation is computed independently. Second, each block is filtered with a set of predefined textons and finally, a co-occurrence relation is established from the orientation and the filtered text on image. This relationship in turn provides a powerful feature vector. To retrieve similar images, the feature vector of the query image is computed and compared with the feature vectors of the stored images using Euclidean distance measure. The proposed algorithm is tested on standard image dataset Corel 1000 for accuracy and recall with favorable results. It is also compared with existing state of the art Context Based Image Retrieval algorithm and showed convincing results.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On Detection and Prevention of Clickjacking Attack for OSNs 基于osn的点击劫持攻击检测与防范
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.37
U. Rehman, W. Khan, N. Saqib, M. Kaleem
{"title":"On Detection and Prevention of Clickjacking Attack for OSNs","authors":"U. Rehman, W. Khan, N. Saqib, M. Kaleem","doi":"10.1109/FIT.2013.37","DOIUrl":"https://doi.org/10.1109/FIT.2013.37","url":null,"abstract":"Click jacking attacks are the emerging threats to websites, especially to online social networks (OSNs). In this paper, we describe some new attacks to online websites. The new Click jacking attacks cause serious damage to users by stealing their personal credentials or by sharing their personal information on social networks bringing moral degradation to them. The attacker applications are hidden behind the sensitive user interface to steal the clicks of the user and use them for the illegal purposes. To detect and prevent Click jacking attacks, we propose a browser-based solution referred to as Cursor Spoofing and Click jacking Prevention (CSCP). CSCP ensures protection Cursor spoofing attack with high effectiveness and also the Like jacking attacks, other variation of Click jacking attacks which associate malicious code to Facebook Like buttons. We have conducted our studies on 442 participants to evaluate the effectiveness of our attacks and also defenses. Results show that our attack success rate falls between 76% and 78%.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"80 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Design and Analysis of Pyramidal Conformal Antenna with Circular Sub-arrays Mounted on a Moving Platform 移动平台上圆形子阵锥体共形天线的设计与分析
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.14
I. Rasheed, Muhammad Abdullah, Tayyab Mehmood, A. Qasim, Muhammad Aamir Naeem
{"title":"Design and Analysis of Pyramidal Conformal Antenna with Circular Sub-arrays Mounted on a Moving Platform","authors":"I. Rasheed, Muhammad Abdullah, Tayyab Mehmood, A. Qasim, Muhammad Aamir Naeem","doi":"10.1109/FIT.2013.14","DOIUrl":"https://doi.org/10.1109/FIT.2013.14","url":null,"abstract":"In this paper, we have proposed the idea of designing a pyramidal conformal array antenna and install it on a moving vehicle. Uniform circular planar array is used and it is replicated to design pyramidal shape conformal array antenna. Single panel circular planar array at 72 degree and at 42 degree is used to build the array geometry of pyramidal shape conformal array. By using circular arrays at 42 degree and at 72 degree the 3-D radiation pattern of pyramidal conformal array antenna has been shown. By using same pyramidal conformal array antenna with different phase slopes the idea of tracking target in the air and on ground is introduced. The applications of pyramidal conformal phased array radar system in defense and in automotive industry are presented in the end.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology-Based Change Impact Assessment in Dynamic Business Processes 动态业务流程中基于本体的变更影响评估
2013 11th International Conference on Frontiers of Information Technology Pub Date : 2013-12-16 DOI: 10.1109/FIT.2013.50
O. Kherbouche, Adeel Ahmad, M. Bouneffa, H. Basson
{"title":"Ontology-Based Change Impact Assessment in Dynamic Business Processes","authors":"O. Kherbouche, Adeel Ahmad, M. Bouneffa, H. Basson","doi":"10.1109/FIT.2013.50","DOIUrl":"https://doi.org/10.1109/FIT.2013.50","url":null,"abstract":"The business process models are often subjected to change rapidly in order to cope with the market demands. It may be useful for companies to adapt a monitoring mechanism to achieve flexible business process models. It is also desirable to control the ripple effects of a change on whole or part of the business process and its running instances. It requires an exhaustive understanding of concerned changes and their application levels. In this article, we propose a methodology based on dependency analysis for an a priori change impact analysis in the business process models. The approach is based on the ontology definitions to describe the dependency relationships. The major objective is to obtain a knowledge base to help the designers and business experts to estimate the associated risk of intended changes and the effort required for their implementation.","PeriodicalId":179067,"journal":{"name":"2013 11th International Conference on Frontiers of Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信