2016 SAI Computing Conference (SAI)最新文献

筛选
英文 中文
Security and privacy for data mining of RFID-enabled product supply chains rfid产品供应链数据挖掘的安全性和隐私性
2016 SAI Computing Conference (SAI) Pub Date : 2016-09-01 DOI: 10.1109/SAI.2016.7556106
Xiaoming Yao, W.-C. Du, Xiaoyi Zhou, Jixin Ma
{"title":"Security and privacy for data mining of RFID-enabled product supply chains","authors":"Xiaoming Yao, W.-C. Du, Xiaoyi Zhou, Jixin Ma","doi":"10.1109/SAI.2016.7556106","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556106","url":null,"abstract":"The e-Pedigree used for verifying the authenticity of the products in RFID-enabled product supply chains plays a very important role in product anti-counterfeiting and risk management, but it is also vulnerable to malicious attacks and privacy leakage. While the radio frequency identification (RFID) technology bears merits such as automatic wireless identification without direct eye-sight contact, its security has been one of the main concerns in recent researches such as tag data tampering and cloning. Moreover, privacy leakage of the partners along the supply chains may lead to complete compromise of the whole system, and in consequence all authenticated products may be replaced by the faked ones! Quite different from other conventional databases, datasets in supply chain scenarios are temporally correlated, and every party of the system can only be semi-trusted. In this paper, a system that incorporates merits of both the secure multi-party computing and differential privacy is proposed to address the security and privacy issues, focusing on the vulnerability analysis of the data mining with distributed EPCIS datasets of e-pedigree having temporal relations from multiple range and aggregate queries in typical supply chain scenarios and the related algorithms. Theoretical analysis shows that our proposed system meets perfectly our preset design goals, while some of the other problems leave for future research.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The weighted least squares ratio (WLSR) method to M-estimators 加权最小二乘比(WLSR)方法对m估计量
2016 SAI Computing Conference (SAI) Pub Date : 2016-09-01 DOI: 10.1109/SAI.2016.7556018
M. Yazici
{"title":"The weighted least squares ratio (WLSR) method to M-estimators","authors":"M. Yazici","doi":"10.1109/SAI.2016.7556018","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556018","url":null,"abstract":"The regression analysis is a considerable statistical instrument applied in many sciences. The ordinary least squares is a conventional method used by Regression Analysis. In regression analysis, the least squares ratio method outperforms than the ordinary least squares method, especially in case of the presence of outliers. This paper includes a novel approach to M-estimators, named the weighted least squares ratio. The aim of this study is to determine which method gives better result in case of increasing outlier and variance while establishing a regression model. The weighted least squares and the weighted least squares ratio methods are compared according to statistics values of mean absolute errors of estimated the regression parameters and dependent value.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy logic-based implicit authentication for mobile access control 基于模糊逻辑的手机接入控制隐式认证
2016 SAI Computing Conference (SAI) Pub Date : 2016-09-01 DOI: 10.1109/SAI.2016.7556097
Feng Yao, S. Yerima, Boojoong Kang, S. Sezer
{"title":"Fuzzy logic-based implicit authentication for mobile access control","authors":"Feng Yao, S. Yerima, Boojoong Kang, S. Sezer","doi":"10.1109/SAI.2016.7556097","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556097","url":null,"abstract":"In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Handling class imbalance in direct marketing dataset using a hybrid data and algorithmic level solutions 使用混合数据和算法级解决方案处理直销数据集中的类别不平衡
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556019
M. M. al-Rifaie, H. Alhakbani
{"title":"Handling class imbalance in direct marketing dataset using a hybrid data and algorithmic level solutions","authors":"M. M. al-Rifaie, H. Alhakbani","doi":"10.1109/SAI.2016.7556019","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556019","url":null,"abstract":"Class imbalance is a major problem in machine learning. It occurs when the number of instances in the majority class is significantly more than the number of instances in the minority class. This is a common problem which is recurring in most datasets, including the one used in this paper (i.e. direct marketing dataset). In direct marketing, businesses are interested in identifying potential buyers, or charities wish to identify potential givers. Several solutions have been suggested in the literature to address this problem, amongst which are data-level techniques, algorithmic-level techniques and a combination of both. In this paper, a model is proposed to solve imbalanced data using a Hybrid of Data-level and Algorithmic-level solutions (HybridDA), which involves oversampling the minority class, undersampling the majority class, and additionally, optimising the cost parameter, the gamma and the kernel type of Support Vector Machines (SVM) using a grid search. The proposed model perfomed competitively compared with other models on the same dataset. The dataset used in this work are real-world data collected from a Portuguese marketing campaign for bank-deposit subscriptions and are available from the University of California, Irvine (UCI) Machine Learning Repository.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Where am I? The challenges of interpretation of natural language descriptions of geographical location 我在哪儿?地理位置的自然语言描述解释的挑战
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556154
Kristin Stock, L. Delazari
{"title":"Where am I? The challenges of interpretation of natural language descriptions of geographical location","authors":"Kristin Stock, L. Delazari","doi":"10.1109/SAI.2016.7556154","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556154","url":null,"abstract":"The ability to identify a coordinate location from a human natural language description is useful for a number of applications. However, a qualitative, empirical survey collecting examples of such descriptions identifies a number of challenges that are not being addressed in current research. This paper describes those challenges and the current status of research in relevant areas.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116164304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFDA: Reliable framework for data administration based on split-merge policy RFDA:基于拆分合并策略的可靠数据管理框架
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556033
R. F. Olanrewaju, B. Khan, A. Baba, R. N. Mir, Sajaad Ahmad Lone
{"title":"RFDA: Reliable framework for data administration based on split-merge policy","authors":"R. F. Olanrewaju, B. Khan, A. Baba, R. N. Mir, Sajaad Ahmad Lone","doi":"10.1109/SAI.2016.7556033","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556033","url":null,"abstract":"Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic mechanism is not robust enough to provide a secure authentication. In this paper, we overcome this issue with our proposed Reliable Framework for Data Administration (RFDA) using split-merge policy, developed to enhance data security. The proposed RFDA performs splitting of data in a unique manner using 128 AES encryption key. Different slots of the encrypted key are placed in different places of rack servers of different cloud zones. The effectiveness and efficiency of the proposed system are analyzed using comparative analysis from which it is seen that the proposed system has outperformed the existing and conventional security standard.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wearable light field optical see-through display to avoid user dependent calibrations: A feasibility study 避免用户依赖校准的可穿戴光场光学透明显示器:可行性研究
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556132
V. Ferrari, E. M. Calabro
{"title":"Wearable light field optical see-through display to avoid user dependent calibrations: A feasibility study","authors":"V. Ferrari, E. M. Calabro","doi":"10.1109/SAI.2016.7556132","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556132","url":null,"abstract":"Wearable augmented reality (AR) is a promising technology for surgical navigation and also for non-medical tasks. Optical see-through displays allow a direct view of the real world augmented with patient related virtual information, which is usually projected on semi-transparent displays placed in front of the eyes. A user-dependent display calibration is required to guarantee a coherent alignment between the virtual information projected on the display and the light rays of the real light field perceived by the user. Integral imaging (II) is a known approach to synthetically generate a light field. A semi-transparent mirror placed at 45° in front of an II display allows obtaining a light field see-through display. In this approach real and virtual information are perceived as coherently aligned independently to the user. In this work we used geometric optics rules to design wearable AR displays, based on II and a semi-transparent mirror, with an optimized visual quality and a tolerated range of movement of the eye in respect to the display. An early implementation demonstrates the feasibility of the proposed solution to implement optical see-through displays that not require user dependent calibrations.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116733462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visualizing document similarity using n-grams and latent semantic analysis 使用n-grams和潜在语义分析可视化文档相似度
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7555994
A. S. Hussein
{"title":"Visualizing document similarity using n-grams and latent semantic analysis","authors":"A. S. Hussein","doi":"10.1109/SAI.2016.7555994","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555994","url":null,"abstract":"As the number of information resources and document quantity explodes, efficient tools with intuitive visualization capabilities desperately needed to assist users in conducting document similarity analysis and/or plagiarism detection tasks by discovering hidden relations among documents. This paper proposes a content-based method for document similarity analysis and visualization. The proposed method is based on modeling the relationship between documents and their n-gram phrases, which are generated from the normalized text, exploiting morphology analysis and lexical lookup. Resolving possible morphological ambiguities is carried out by tagging the words within the examined documents. Text indexing and stop-words removal are performed, employing a new technique that is efficient in dealing with multiple long documents. The examined documents' TF-IDF model is constructed using heuristic based pair-wise matching algorithm, considering lexical and syntactic changes. Then, the hidden associations between the documents and their unique n-gram phrases are investigated using Latent Semantic Analysis (LSA). Next, the pairwise document subset and similarity measures are derived from the Singular Value Decomposition (SVD) computations. Different visualization techniques are then applied on the SVD results to expose the hidden relations among the documents under consideration. As Arabic is one of the most morphological and complicated languages, this paper emphasizes Arabic documents similarity analysis and visualization. Various experiments were carried out revealing the strong capabilities of the proposed method in analyzing and visualizing literal and some types of intelligent similarities.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129697395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
SimUVEx v2: A numeric model to predict anatomical solar ultraviolet exposure SimUVEx v2:一个预测解剖太阳紫外线照射的数值模型
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556156
A. Religi, L. Moccozet, Meghdad Farahmand, L. Vuilleumier, D. Vernez, A. Milon, J. Bulliard, C. Backes
{"title":"SimUVEx v2: A numeric model to predict anatomical solar ultraviolet exposure","authors":"A. Religi, L. Moccozet, Meghdad Farahmand, L. Vuilleumier, D. Vernez, A. Milon, J. Bulliard, C. Backes","doi":"10.1109/SAI.2016.7556156","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556156","url":null,"abstract":"Solar ultraviolet (UV) radiation has a dual effect on human health. Low UV doses promote the photosynthesis of vitamin D and regulate calcium and phosphorus metabolism, while an excessive UV exposure is the main cause of skin cancer, along with eye diseases and premature skin ageing. Nevertheless, the link between UV radiation levels and UV exposure is not fully understood since exposure data are limited and individual anatomical variations in UV doses are significant. For these reasons, a numeric simulation tool (SimUVEx) has been developed and validated in order to predict the dose and distribution of UV exposure received taking into account postural information and ambient irradiation data. SimUVEx is based on 3D graphics techniques usually used to render virtual environments to estimate the exposure of a 3D virtual manikin characterised as a triangular mesh surface. Each triangle receives a certain quantity of solar energy depending on the direct, diffuse and reflected radiation, the body surface orientation to the sun and the shadows from other parts of the body. The goals of the second version of SimUVEx are to move from individual-based to population-based (e.g., Switzerland and, eventually, Europe) exposure assessment, expanding temporal, spatial and morphological simulation capabilities. Outputs from SimUVEx version 2 will allow building exposure scenarios, identifying high-risk situations and producing reference dose ranges for typical outdoor occupational and leisure activities.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A framework for objective performance evaluation for digital font reconstruction 数字字体重建的客观性能评价框架
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556008
Hasan S. M. Al-Khaffaf, A. Talib, W. Zainon, M. A. Osman
{"title":"A framework for objective performance evaluation for digital font reconstruction","authors":"Hasan S. M. Al-Khaffaf, A. Talib, W. Zainon, M. A. Osman","doi":"10.1109/SAI.2016.7556008","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556008","url":null,"abstract":"Optical Character Recognition (OCR) systems have been around for a long time. However, the need for such systems goes further than just the need to convert a scanned document into a text file. There is also a need to produce a more appealing and refine reconstructed fonts. Recently, many research works in font reconstruction have shown successful and encouraging results. However, the usual way of evaluating the performance of font reconstruction is through visual inspection which is very subjective in nature, and arduous for a more perfect and objective evaluation. Therefore, the main objective of this paper is to present a framework for an objective performance evaluation method that can be used to compare a reconstructed font with its original counterpart. Thus, it will involve studying the nature of the current and existing digital fonts and then formulate a method to compare character glyph of the created font with its corresponding original font. From this framework, it is expected that font reconstruction would be made more refine and the evaluation can be made more objective and less arduous than using the human eye, and old and rare documents can be more readily available for users in digital format with better precision in particular on tablets and other resource-constrained devices.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128296696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信