International Conference on IT Convergence and Security最新文献

筛选
英文 中文
New Proposed Z-Transform Based Encryption Algorithm 一种新的基于z变换的加密算法
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740356
Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni
{"title":"New Proposed Z-Transform Based Encryption Algorithm","authors":"Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni","doi":"10.1109/ICITCS.2016.7740356","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740356","url":null,"abstract":"The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Semantic Framework for Software Requirement Specification 设计软件需求规范的语义框架
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740324
Taimoor Hassan, Shoaib Hassan
{"title":"Design Semantic Framework for Software Requirement Specification","authors":"Taimoor Hassan, Shoaib Hassan","doi":"10.1109/ICITCS.2016.7740324","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740324","url":null,"abstract":"In the recent past, domain specific solutions for detailed semantic analysis have got acceptable by natural language processing community and use of applications involving natural language based user interface. Different approaches that has been previously used is focusing on quality of text and improving the text contents by adding semantic information with text then the existing approaches used for semantic analysis can provide better results. In this, an approach was presented to address the problem of non- availability of semantic information required for better semantic analysis. This problem is solved by using semantic technology to annotate text of software requirements expressed in a natural language with their domain specific semantics and investigate the effect of semantic analysis with attached semantics. The presented approach uses a semantic framework specifically designed for interpretation and detailed semantic analysis of natural language software requirement specifications. The used framework is based on semantic technology involves knowledge extracted from existing software requirement documents and knowledge extracted from existing applications. The presented approach shows that by adapting and combing existing ontologies to support knowledge management, developing system and performing experiments on requirement of real world software systems. In this approach start with software requirement specification, after this clean the irrelevant requirements, convert the cleaned requirements into graph that represents inter related different elements. Represent the requirement graph into sparse matrix, after these all steps; we generate ontology with the help of OntoGen tool.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique 基于整体特征提取和纠错码的生物识别模板保护技术
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740341
Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid
{"title":"Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique","authors":"Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid","doi":"10.1109/ICITCS.2016.7740341","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740341","url":null,"abstract":"Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and crossmatching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, Error Correcting Code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain 巴林王国项目管理软件的功能与复杂性分析
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740339
Sarmad Mohammad
{"title":"Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain","authors":"Sarmad Mohammad","doi":"10.1109/ICITCS.2016.7740339","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740339","url":null,"abstract":"Abstract- Arab Open University conducted an online survey to determine the degree of usage for specific project management software to develop and enhance the project management process in Kingdom of Bahrain. The main purpose of this study is to find out new approach to make the use of project management more effective and efficient as possible. It's started with overview of the framework of project management and the current way to deal with project software. Functionality versus complexity and SWOT analysis conducted to find out the weak point in the current process; to check for the chance of enhancement and \"new opportunity\" to empower the current strength and to construct an effective metrics for these significant issues of most frequently software implemented in kingdom of Bahrain. The problem mainly stated that the users of project management software not take the full advantage of the information technology which raises the questions: how much users rely on the project management software and degree to measure user's satisfaction with the current project management software.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems 求解高度多模态问题的快速收敛的斥力-推进萤火虫算法
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740365
Abhijit Banerjee, D. Ghosh, Suvrojit Das
{"title":"Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems","authors":"Abhijit Banerjee, D. Ghosh, Suvrojit Das","doi":"10.1109/ICITCS.2016.7740365","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740365","url":null,"abstract":"This paper proposes a modified firefly algorithm (PropFA) to solve highly multimodal problems with fast convergence. In this algorithm every firefly is fitted with a short term memory which facilitates the \"Repulsion\" force acting on every firefly whereas the introduction of brightness of the best firefly in the movement equation facilitates \"Propulsion\" force acting on the firefly. Furthermore; no firefly is allowed to move beyond its maximum stride parameter to prevent premature convergence. All other parameters α,β and γ and are designed to be adaptive to suite to almost all multimodal problems without setting them to any a-priori values. Efficiency of PropFA is then verified over six standard test functions. In all of them it is observed that PropFA converges faster than FA and PSO.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127122033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Agent Based Architecture for Resource Allocation in Cloud Computing 云计算中基于安全代理的资源分配体系结构
International Conference on IT Convergence and Security Pub Date : 2016-09-01 DOI: 10.1109/ICITCS.2016.7740307
Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim
{"title":"A Secure Agent Based Architecture for Resource Allocation in Cloud Computing","authors":"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim","doi":"10.1109/ICITCS.2016.7740307","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740307","url":null,"abstract":"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131631337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market 为赞助搜索市场设计的增强TAC/AA竞争模型
International Conference on IT Convergence and Security Pub Date : 2014-10-01 DOI: 10.1109/ICITCS.2014.7021731
Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang
{"title":"An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market","authors":"Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang","doi":"10.1109/ICITCS.2014.7021731","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021731","url":null,"abstract":"This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future works.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Identity-Based Ring Signcryption Scheme 基于身份的环签名加密方案
International Conference on IT Convergence and Security Pub Date : 2013-04-01 DOI: 10.1007/978-94-007-5860-5_18
G. Sharma, S. Bala, A. Verma
{"title":"An Identity-Based Ring Signcryption Scheme","authors":"G. Sharma, S. Bala, A. Verma","doi":"10.1007/978-94-007-5860-5_18","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_18","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Full-Scaled Experiment for Behavior Investigation of Reinforced Concrete Columns with High-Strength Wire Ropes as Lateral Spiral Reinforcement 高强钢丝绳作横向螺旋配筋钢筋混凝土柱性能研究的实尺试验
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_136
Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim
{"title":"Full-Scaled Experiment for Behavior Investigation of Reinforced Concrete Columns with High-Strength Wire Ropes as Lateral Spiral Reinforcement","authors":"Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim","doi":"10.1007/978-94-007-5860-5_136","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_136","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory 基于先天免疫和危险理论的新型恶意软件检测框架
International Conference on IT Convergence and Security Pub Date : 2013-02-26 DOI: 10.1007/978-94-007-5860-5_4
M. Ali, M. A. Maarof
{"title":"A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory","authors":"M. Ali, M. A. Maarof","doi":"10.1007/978-94-007-5860-5_4","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_4","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信