2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
A framework for measurability of security 安全性可度量性的框架
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921989
Seraj Fayyad, Josef Noll
{"title":"A framework for measurability of security","authors":"Seraj Fayyad, Josef Noll","doi":"10.1109/IACS.2017.7921989","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921989","url":null,"abstract":"Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate this process. One of the productive approaches, which overcame the complexity of evaluation for Security, Privacy and Dependability (SPD) is the Multi Metrics (MM). As most of SPD evaluation approaches, the MM approach bases on the experts knowledge for the basic evaluation. Regardless of its advantages, experts evaluation has some drawbacks, which foster the need for less experts-dependent evaluation. In this paper, we propose a framework for security measurability as a part of security, privacy and dependability evaluation. The security evaluation based on Multi Metric (MM) approach as being an effective approach for evaluations, thus, we call it MM framework. The art of evaluation investigated within MM framework, based also on systematic storing and retrieving of experts knowledge. Using MM framework, the administrator of the ES could evaluate and enhance the S-level of their system, without being an expert in security.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using metadata in optimizing the design and development of enterprise information systems 利用元数据优化企业信息系统的设计和开发
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921969
Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef
{"title":"Using metadata in optimizing the design and development of enterprise information systems","authors":"Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef","doi":"10.1109/IACS.2017.7921969","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921969","url":null,"abstract":"Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design and develop such systems. This paper presents a proposed approach of using a metadata model to design and implement APIs that can be utilized and reused as separate libraries to build enterprise information systems more effectively and efficiently than the traditional approaches. Primarily results of validating the proposed approach show promising potentials in reducing the manual development time and effort by an average of 64%.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of Harmonic and Arithmetic-Geometric Mean inequality for performance analysis of relay networks 谐波不等式与算术几何平均不等式在中继网络性能分析中的比较
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921982
M. Khalil, S. Berber, K. Sowerby
{"title":"Comparison of Harmonic and Arithmetic-Geometric Mean inequality for performance analysis of relay networks","authors":"M. Khalil, S. Berber, K. Sowerby","doi":"10.1109/IACS.2017.7921982","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921982","url":null,"abstract":"A new method of analyzing the Asymptotic Bit Error Rate (ABER) performance of Bidirectional Amplify-and-Forward Multiple Relay (BAF-MR) networks is presented in this paper. The analytical expression of the average Signal-to-Noise Ratio (SNR) is derived using both of Arithmetic-Geometric Mean inequality (AGM) and Harmonic Mean (HM). The ABER results obtained from the AGM and HM are then compared to determine the more accurate ABER. All the analytical expressions are verified using simulation results.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for clustering LTE devices for implementing group D2D communication and multicast capability 一种用于实现组D2D通信和多播能力的LTE设备集群的框架
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921974
Salam Doumiati, H. Artail, K. Kabalan
{"title":"A framework for clustering LTE devices for implementing group D2D communication and multicast capability","authors":"Salam Doumiati, H. Artail, K. Kabalan","doi":"10.1109/IACS.2017.7921974","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921974","url":null,"abstract":"In fluctuating mobile environments where operators have to confront the increasing demands of their subscribers, insufficient spectrum poses capacity limitations. This work studies the gain that cooperative multicast transmission provides when used to boost the data rate in Device-to-Device (D2D) communication, enabling data sharing among users. A multicast network combines the benefits of both a fixed cellular infrastructure and the flexibility of an ad hoc network. However, a challenging issue is the need to cluster devices in a way that yields good channel quality between the clusterhead and each one of the cluster members. In this paper, we propose a D2D clustering scheme that achieves the above goal and works within the confines of the LTE standard. Simulations conducted using Matlab show how direct communication within a group of devices, cluster, can improve the performance of a conventional cellular system.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129090421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Real-time intruder surveillance using low-cost remote wireless sensors 使用低成本远程无线传感器的实时入侵者监控
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921970
Muhannad Quwaider
{"title":"Real-time intruder surveillance using low-cost remote wireless sensors","authors":"Muhannad Quwaider","doi":"10.1109/IACS.2017.7921970","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921970","url":null,"abstract":"Intruder Detection is needed in order to monitor sensitive passages or gateways. These passages are usually existing in airports, police stations, government buildings, courts or even in special laboratories, like nuclear or chemical laboratories. For security or safety purposes, nobody is usually allowed to walk through these passages without permission and during the working hours. Video streaming monitoring systems are usually expensive in terms of data communication and data analysis, which may need an extra human subject analysis. In addition, to the scene limit of the camera visible area. In this paper we present real-time intruder detection mechanism using remote wireless sensor networks. Pair of wireless sensors are deployed in the monitored passage. In order to detect the motion of intruders, the proposed mechanism adopts the measured Received Signal Strength Indicator (RSSI) of the Radio Frequency (RF) signal between the deployed sensors. The results show that the RSSI of the received signal is reduced significantly when there are intruders in the passage and the amount of reduction depends on the number of intruders.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IMHT: Improved MHT-LEACH protocol for wireless sensor networks IMHT:改进的无线传感器网络MHT-LEACH协议
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921979
Emad Alnawafa, I. Marghescu
{"title":"IMHT: Improved MHT-LEACH protocol for wireless sensor networks","authors":"Emad Alnawafa, I. Marghescu","doi":"10.1109/IACS.2017.7921979","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921979","url":null,"abstract":"Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved multi-hope technique (IMHT-LEACH) is proposed. Instead of distributing all the Cluster Heads (CHs) into two levels as in the MHT-LEACH, the IMHT-LEACH distributes all the CHs into a number of levels. It suggests a new technique to route the data to the Base Station (BS) through the levels. Simulation results indicate that the IMHT-LEACH improves the lifetime, stability and throughput of the WSN comparing with the conventional LEACH and the MHT-LEACH protocols.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Towards a model-based approach for developing and QA of online business processes 为在线业务流程的开发和质量保证采用基于模型的方法
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921952
Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton
{"title":"Towards a model-based approach for developing and QA of online business processes","authors":"Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton","doi":"10.1109/IACS.2017.7921952","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921952","url":null,"abstract":"Business Process Management (BPM) is used to move existing paper-based business processes into online in order to improve the quality of provided services and reduce the operational costs. A typical approach of BPM focuses on implementing the online business process and neglect validating the improvement of quality the new process in terms of defined business goals. It is desirable to detect and anticipate any deficiencies in meeting business goals at the early stages of business process development where corrective actions can be more easily made. In this paper, we propose a model-based approach for developing and providing quality assurance of online business processes. The approach measures the performance of online business processes as they are being developed. It also provides a repeatable, systematic, cost-efficient approach to quality assurance using a testing workbench with a suite of testing tools. The approach prototype is evaluated using a hospital case study developed in collaboration with a hospital in Canada to develop an online business process for cancer patients' assessment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods 利用对比有限自适应直方图均衡化(CLAHE)和形态学方法早期诊断乳腺癌
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921957
Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi
{"title":"Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods","authors":"Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921957","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921957","url":null,"abstract":"The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Personalized information retrieval through alignment of ontologies: State of art 通过本体对齐的个性化信息检索:技术现状
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921963
Oumayma Banouar, S. Raghay
{"title":"Personalized information retrieval through alignment of ontologies: State of art","authors":"Oumayma Banouar, S. Raghay","doi":"10.1109/IACS.2017.7921963","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921963","url":null,"abstract":"Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at the time of interrogation. The purpose of the personalization is to facilitate the expression of users' needs. It allows them to obtain relevant information by maximizing the exploitation of their preferences grouped in their respective profiles. Our work aims to extend the users queries by extending the research field using ontologies. In a mediation architecture context, founded on the couple mediator-adapter, our process must consider not only the users' profiles but also the semantic description of data sources defined by mediation requests. The mediator solves the problems associated with heterogeneity while adapters describe the available data sources. The users express their requests in terms of a global schema when the system evaluates them over multiple data sources with different structure and content. Each data source is modeled using a local ontology when the global schema is obtained via a global one. The use of an adequate process of ontology alignment will allow us to increase the recall (retrieved information) and the precision or accuracy (relevant information) of our integration system. This article is a comparative study of the existing works that attempt to establish matching and alignment between ontologies. It presents their capabilities in terms of information retrieval metrics namely: precision, recall and F-measure. It highlights then their strength and week points. In addition, it presents the massive role of machine learning techniques to insure the interoperability over large-scale ontologies.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Victory sign biometrie for terrorists identification: Preliminary results 胜利标志生物特征识别恐怖分子:初步结果
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921968
Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem
{"title":"Victory sign biometrie for terrorists identification: Preliminary results","authors":"Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem","doi":"10.1109/IACS.2017.7921968","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921968","url":null,"abstract":"Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信