{"title":"VENCE: A new machine learning method enhanced by ontological knowledge to extract summaries","authors":"Jésus Antonio Motta, L. Capus, N. Tourigny","doi":"10.1109/SAI.2016.7555963","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555963","url":null,"abstract":"Obtaining extractive summaries by using functions induced from a training set continue to be a great challenge in the domain of the automatic text summary. This paper presents the VENCE method based on this approach and improves the quality of the abduced functions, using semantic relations of the words (attributes) of the training set that are fetched from a ontology to be inserted in this set. The choice of this training set is reinforced with the optimization of the space of attributes by means of statistical techniques, as well as with the introduction of the Jaccard index, calculated from considering a manual summary that is extracted from the corpus of the chosen documents. The VENCE method is explained in details as well as the different experiments conducted to propose an optimal process. Its application to a text document corpus highlighted its efficiency. The results obtained are very satisfactory for the assessment of discriminating power of the abduced classification function as well as for the quality of summaries produced.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A-RSA: Augmented RSA","authors":"A. Karakra, Ahmad S. Alsadeh","doi":"10.1109/SAI.2016.7556103","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556103","url":null,"abstract":"Today, RSA algorithm is the most widely used public-key cryptosystem around the world. It is used for security in everything from online shopping to cell phones. However, the basic RSA is not semantically secure, i.e., encrypting the same message more than once always gives the same ciphertext. For this reason, the basic RSA is vulnerable to set of indirect attacks, such as known plaintext, chosen plaintext, timing, common modulus, and frequency of blocks (FOB) attacks. Moreover, RSA is known to be much slower than the standards symmetric key encryption and it does not used for encrypting large data. In this paper, we design and implement a swift and secure variant of RSA based on Rabin and Huffman coding called Augmented RSA (A-RSA) to solve aforementioned limitations of the basic RSA. A new additional randomization component r is added in A-RSA. This component is encrypted by Rabin algorithm to improve the security level of RSA against the indirect attacks and make RSA semantically secure. Moreover, A-RSA makes the factorization problem harder, since the attackers need to break the factorization of large numbers for both RSA and Rabin. Besides, employing Huffman Coding compression in A-RSA prevents FOB attack and speeds up the execution time for the A-RSA. Our testing results over set of file sizes of 1MB, 2MB, 3MB, to 10 MB show that A-RSA's average execution time is equal to 0.55 of the average execution time of the basic RSA in encryption process and 0.01 in decryption process. Also, we found that RSA system increases the size of ciphertext by 1% compared to the original file size, while the average size of A-RSA files is equal 0.46 of its original sizes.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed El Bekri, Ouafaa Diouri, Abdelaali Tioutiou
{"title":"Towards a classification of things","authors":"Mohamed El Bekri, Ouafaa Diouri, Abdelaali Tioutiou","doi":"10.1109/SAI.2016.7556138","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556138","url":null,"abstract":"The aim of internet of things is to connect everything with everything, the special interest given to the subject by researchers, companies and enthusiasts by the idea has led to a real enrichment of the network by entirely new objects that no one has expected them to be part of the internet before. This document aims at first; to illustrate the main technological transformations occurred to things since the very first appearance, then providing a basis of objects classification in a way that reflects how different they are.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stigmergic interoperability for autonomic systems: Managing complex interactions in multi-manager scenarios","authors":"Thaddeus Eze, R. Anthony","doi":"10.1109/SAI.2016.7556029","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556029","url":null,"abstract":"The success of autonomic computing has led to its popular use in many application domains, leading to scenarios where multiple autonomic managers (AMs) coexist, but without adequate support for interoperability. This is evident, for example, in the increasing number of large datacentres with multiple managers which are independently designed. The increase in scale and size coupled with heterogeneity of services and platforms means that more AMs could be integrated to manage the arising complexity. This has led to the need for interoperability between AMs. Interoperability deals with how to manage multi-manager scenarios, to govern complex coexistence of managers and to arbitrate when conflicts arise. This paper presents an architecture-based stigmergic interoperability solution. The solution presented in this paper is based on the Trustworthy Autonomic Architecture (TAArch) and uses stigmergy (the means of indirect communication via the operating environment) to achieve indirect coordination among coexisting agents. Usually, in stigmergy-based coordination, agents may be aware of the existence of other agents. In the approach presented here in, agents (autonomic managers) do not need to be aware of the existence of others. Their design assumes that they are operating in `isolation' and they simply respond to changes in the environment. Experimental results with a datacentre multi-manager scenario are used to analyse the proposed approach.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Diouf, I. Diop, I. Dioum, S. M. Farssi, Birahime Diouf, K. Tall
{"title":"Study of polar codes MIMO channels polarization using MIMO system","authors":"M. Diouf, I. Diop, I. Dioum, S. M. Farssi, Birahime Diouf, K. Tall","doi":"10.1109/SAI.2016.7556056","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556056","url":null,"abstract":"Polar codes are known as the first provable code construction to achieve Shannon capacity for arbitrary symmetric binary input channels. Several schemes to provides both detection/decoding of the transmitted and the transmit antenna index in Multiple-Input Multiple-Output (MIMO) antenna systems were proposed in the literature for polar codes. In this paper we have critically analyzed various MIMO channel polarization using polar codes extended to the multiple antenna transmission, and also have covered free polar set and frozen polar set for respectively mapping transmitted information and transmit antenna index.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130776842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A forensic cloud environment to address the big data challenge in digital forensics","authors":"Oteng Tabona, A. Blyth","doi":"10.1109/SAI.2016.7556039","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556039","url":null,"abstract":"The advancement of technologies such as the Internet, artificial intelligence and so on has given rise to Big Data. Also as a result of technological evolution, crimes committed within the digital domain are rising. Subsequently the number of forensic collection has increased and this has significantly affected digital forensics. Thus, the current forensic tools cannot cope with the demand of Big Data analysis. In this paper, we realise the urgent need to propose a generic Forensic Cloud Environment (FCE) that facilitates forensic analysis of Big Data cases. The FCE introduces new features that improves the turnaround time of digital forensic investigation.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open badges: A best-practice framework","authors":"L. Voogt, L. Dow, S. Dobson","doi":"10.1109/SAI.2016.7556070","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556070","url":null,"abstract":"The widespread adoption of online education is severely challenged by issues of verifiability, reliability, security and credibility. Open Badges exist to address these challenges, but there is no consensus as to what constitutes best practices regarding the implementation of an Open Badge system within an educational context. In this paper we survey the current landscape of Open Badges from educational and technological perspectives. We analyze a broad set of openly-reported pilot projects and case studies, and derive a comprehensive best practice framework that tries to capture the requirements for successful implementation within educational institutions. We conclude by identifying some significant gaps in the technology and identify some possible future research directions.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"12 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A deep learning based approach to classification of CT brain images","authors":"Xiaohong W. Gao, R. Hui","doi":"10.1109/SAI.2016.7555958","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555958","url":null,"abstract":"This study explores the applicability of the state of the art of deep learning convolutional neural network (CNN) to the classification of CT brain images, aiming at bring images into clinical applications. Towards this end, three categories are clustered, which contains subjects' data with either Alzheimer's disease (AD) or lesion (e.g. tumour) or normal ageing. Specifically, due to the characteristics of CT brain images with larger thickness along depth (z) direction (~5mm), both 2D and 3D CNN are employed in this research. The fusion is therefore conducted based on both 2D CT images along axial direction and 3D segmented blocks with the accuracy rates are 88.8%, 76.7% and 95% for classes of AD, lesion and normal respectively, leading to an average of 86.8%.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical solution of fuzzy heat equation with two different fuzzifications","authors":"Hamzeh H. Zureigat, A. I. Ismail","doi":"10.1109/SAI.2016.7555966","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555966","url":null,"abstract":"In this paper, we consider the use of the forward time, centered space (FTCS) method to numerically solve the fuzzy heat equation. In particular, we study the effects on the numerical output of the use of two different types of fuzzifications.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption","authors":"M. Benssalah, M. Djeddou, Karim Drouiche","doi":"10.1109/SAI.2016.7556111","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556111","url":null,"abstract":"RFID (radio frequency identification) is an efficient automatic identification technology used in a wide variety of applications and more recently as a leading authentication technology in many security services. However, the wireless nature of the transmitted data causes various security issues that must be addressed decisively. To solve these issues, numerous solutions and attempts have been proposed in the literature using several cryptographic primitives. Yet, it is still uncertain about the practicability of a significant number of these protocols, as their hardware implementation has not received much attention. In this paper, we deal with an efficient FPGA implementation and validation of an RFID authentication protocol based on elliptic curve (ECC) encryption scheme. As far as we know, this is the first FPGA implementation of an RFID authentication protocol based on ECC-ElGamal encryption. We believe that the proposed design architecture will bring a new clarity to others ECC-based protocols architectures. In addition, we illustrate the effectiveness of the implemented architecture in the car key systems.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133844514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}