2016 SAI Computing Conference (SAI)最新文献

筛选
英文 中文
VENCE: A new machine learning method enhanced by ontological knowledge to extract summaries VENCE:一种基于本体知识的机器学习提取摘要的新方法
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7555963
Jésus Antonio Motta, L. Capus, N. Tourigny
{"title":"VENCE: A new machine learning method enhanced by ontological knowledge to extract summaries","authors":"Jésus Antonio Motta, L. Capus, N. Tourigny","doi":"10.1109/SAI.2016.7555963","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555963","url":null,"abstract":"Obtaining extractive summaries by using functions induced from a training set continue to be a great challenge in the domain of the automatic text summary. This paper presents the VENCE method based on this approach and improves the quality of the abduced functions, using semantic relations of the words (attributes) of the training set that are fetched from a ontology to be inserted in this set. The choice of this training set is reinforced with the optimization of the space of attributes by means of statistical techniques, as well as with the introduction of the Jaccard index, calculated from considering a manual summary that is extracted from the corpus of the chosen documents. The VENCE method is explained in details as well as the different experiments conducted to propose an optimal process. Its application to a text document corpus highlighted its efficiency. The results obtained are very satisfactory for the assessment of discriminating power of the abduced classification function as well as for the quality of summaries produced.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A-RSA: Augmented RSA
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556103
A. Karakra, Ahmad S. Alsadeh
{"title":"A-RSA: Augmented RSA","authors":"A. Karakra, Ahmad S. Alsadeh","doi":"10.1109/SAI.2016.7556103","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556103","url":null,"abstract":"Today, RSA algorithm is the most widely used public-key cryptosystem around the world. It is used for security in everything from online shopping to cell phones. However, the basic RSA is not semantically secure, i.e., encrypting the same message more than once always gives the same ciphertext. For this reason, the basic RSA is vulnerable to set of indirect attacks, such as known plaintext, chosen plaintext, timing, common modulus, and frequency of blocks (FOB) attacks. Moreover, RSA is known to be much slower than the standards symmetric key encryption and it does not used for encrypting large data. In this paper, we design and implement a swift and secure variant of RSA based on Rabin and Huffman coding called Augmented RSA (A-RSA) to solve aforementioned limitations of the basic RSA. A new additional randomization component r is added in A-RSA. This component is encrypted by Rabin algorithm to improve the security level of RSA against the indirect attacks and make RSA semantically secure. Moreover, A-RSA makes the factorization problem harder, since the attackers need to break the factorization of large numbers for both RSA and Rabin. Besides, employing Huffman Coding compression in A-RSA prevents FOB attack and speeds up the execution time for the A-RSA. Our testing results over set of file sizes of 1MB, 2MB, 3MB, to 10 MB show that A-RSA's average execution time is equal to 0.55 of the average execution time of the basic RSA in encryption process and 0.01 in decryption process. Also, we found that RSA system increases the size of ciphertext by 1% compared to the original file size, while the average size of A-RSA files is equal 0.46 of its original sizes.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards a classification of things 对事物进行分类
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556138
Mohamed El Bekri, Ouafaa Diouri, Abdelaali Tioutiou
{"title":"Towards a classification of things","authors":"Mohamed El Bekri, Ouafaa Diouri, Abdelaali Tioutiou","doi":"10.1109/SAI.2016.7556138","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556138","url":null,"abstract":"The aim of internet of things is to connect everything with everything, the special interest given to the subject by researchers, companies and enthusiasts by the idea has led to a real enrichment of the network by entirely new objects that no one has expected them to be part of the internet before. This document aims at first; to illustrate the main technological transformations occurred to things since the very first appearance, then providing a basis of objects classification in a way that reflects how different they are.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stigmergic interoperability for autonomic systems: Managing complex interactions in multi-manager scenarios 自主系统的污名互操作性:管理多管理器场景中的复杂交互
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556029
Thaddeus Eze, R. Anthony
{"title":"Stigmergic interoperability for autonomic systems: Managing complex interactions in multi-manager scenarios","authors":"Thaddeus Eze, R. Anthony","doi":"10.1109/SAI.2016.7556029","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556029","url":null,"abstract":"The success of autonomic computing has led to its popular use in many application domains, leading to scenarios where multiple autonomic managers (AMs) coexist, but without adequate support for interoperability. This is evident, for example, in the increasing number of large datacentres with multiple managers which are independently designed. The increase in scale and size coupled with heterogeneity of services and platforms means that more AMs could be integrated to manage the arising complexity. This has led to the need for interoperability between AMs. Interoperability deals with how to manage multi-manager scenarios, to govern complex coexistence of managers and to arbitrate when conflicts arise. This paper presents an architecture-based stigmergic interoperability solution. The solution presented in this paper is based on the Trustworthy Autonomic Architecture (TAArch) and uses stigmergy (the means of indirect communication via the operating environment) to achieve indirect coordination among coexisting agents. Usually, in stigmergy-based coordination, agents may be aware of the existence of other agents. In the approach presented here in, agents (autonomic managers) do not need to be aware of the existence of others. Their design assumes that they are operating in `isolation' and they simply respond to changes in the environment. Experimental results with a datacentre multi-manager scenario are used to analyse the proposed approach.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of polar codes MIMO channels polarization using MIMO system 用MIMO系统研究极码MIMO信道极化
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556056
M. Diouf, I. Diop, I. Dioum, S. M. Farssi, Birahime Diouf, K. Tall
{"title":"Study of polar codes MIMO channels polarization using MIMO system","authors":"M. Diouf, I. Diop, I. Dioum, S. M. Farssi, Birahime Diouf, K. Tall","doi":"10.1109/SAI.2016.7556056","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556056","url":null,"abstract":"Polar codes are known as the first provable code construction to achieve Shannon capacity for arbitrary symmetric binary input channels. Several schemes to provides both detection/decoding of the transmitted and the transmit antenna index in Multiple-Input Multiple-Output (MIMO) antenna systems were proposed in the literature for polar codes. In this paper we have critically analyzed various MIMO channel polarization using polar codes extended to the multiple antenna transmission, and also have covered free polar set and frozen polar set for respectively mapping transmitted information and transmit antenna index.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130776842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A forensic cloud environment to address the big data challenge in digital forensics 取证云环境,应对数字取证中的大数据挑战
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556039
Oteng Tabona, A. Blyth
{"title":"A forensic cloud environment to address the big data challenge in digital forensics","authors":"Oteng Tabona, A. Blyth","doi":"10.1109/SAI.2016.7556039","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556039","url":null,"abstract":"The advancement of technologies such as the Internet, artificial intelligence and so on has given rise to Big Data. Also as a result of technological evolution, crimes committed within the digital domain are rising. Subsequently the number of forensic collection has increased and this has significantly affected digital forensics. Thus, the current forensic tools cannot cope with the demand of Big Data analysis. In this paper, we realise the urgent need to propose a generic Forensic Cloud Environment (FCE) that facilitates forensic analysis of Big Data cases. The FCE introduces new features that improves the turnaround time of digital forensic investigation.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Open badges: A best-practice framework 开放徽章:最佳实践框架
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556070
L. Voogt, L. Dow, S. Dobson
{"title":"Open badges: A best-practice framework","authors":"L. Voogt, L. Dow, S. Dobson","doi":"10.1109/SAI.2016.7556070","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556070","url":null,"abstract":"The widespread adoption of online education is severely challenged by issues of verifiability, reliability, security and credibility. Open Badges exist to address these challenges, but there is no consensus as to what constitutes best practices regarding the implementation of an Open Badge system within an educational context. In this paper we survey the current landscape of Open Badges from educational and technological perspectives. We analyze a broad set of openly-reported pilot projects and case studies, and derive a comprehensive best practice framework that tries to capture the requirements for successful implementation within educational institutions. We conclude by identifying some significant gaps in the technology and identify some possible future research directions.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"12 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A deep learning based approach to classification of CT brain images 基于深度学习的CT脑图像分类方法
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7555958
Xiaohong W. Gao, R. Hui
{"title":"A deep learning based approach to classification of CT brain images","authors":"Xiaohong W. Gao, R. Hui","doi":"10.1109/SAI.2016.7555958","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555958","url":null,"abstract":"This study explores the applicability of the state of the art of deep learning convolutional neural network (CNN) to the classification of CT brain images, aiming at bring images into clinical applications. Towards this end, three categories are clustered, which contains subjects' data with either Alzheimer's disease (AD) or lesion (e.g. tumour) or normal ageing. Specifically, due to the characteristics of CT brain images with larger thickness along depth (z) direction (~5mm), both 2D and 3D CNN are employed in this research. The fusion is therefore conducted based on both 2D CT images along axial direction and 3D segmented blocks with the accuracy rates are 88.8%, 76.7% and 95% for classes of AD, lesion and normal respectively, leading to an average of 86.8%.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Numerical solution of fuzzy heat equation with two different fuzzifications 两种不同模糊化的模糊热方程的数值解
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7555966
Hamzeh H. Zureigat, A. I. Ismail
{"title":"Numerical solution of fuzzy heat equation with two different fuzzifications","authors":"Hamzeh H. Zureigat, A. I. Ismail","doi":"10.1109/SAI.2016.7555966","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555966","url":null,"abstract":"In this paper, we consider the use of the forward time, centered space (FTCS) method to numerically solve the fuzzy heat equation. In particular, we study the effects on the numerical output of the use of two different types of fuzzifications.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption 基于椭圆曲线加密的RFID有源认证协议的设计与实现
2016 SAI Computing Conference (SAI) Pub Date : 2016-07-13 DOI: 10.1109/SAI.2016.7556111
M. Benssalah, M. Djeddou, Karim Drouiche
{"title":"Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption","authors":"M. Benssalah, M. Djeddou, Karim Drouiche","doi":"10.1109/SAI.2016.7556111","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556111","url":null,"abstract":"RFID (radio frequency identification) is an efficient automatic identification technology used in a wide variety of applications and more recently as a leading authentication technology in many security services. However, the wireless nature of the transmitted data causes various security issues that must be addressed decisively. To solve these issues, numerous solutions and attempts have been proposed in the literature using several cryptographic primitives. Yet, it is still uncertain about the practicability of a significant number of these protocols, as their hardware implementation has not received much attention. In this paper, we deal with an efficient FPGA implementation and validation of an RFID authentication protocol based on elliptic curve (ECC) encryption scheme. As far as we know, this is the first FPGA implementation of an RFID authentication protocol based on ECC-ElGamal encryption. We believe that the proposed design architecture will bring a new clarity to others ECC-based protocols architectures. In addition, we illustrate the effectiveness of the implemented architecture in the car key systems.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133844514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信