{"title":"Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks","authors":"S. Tabatabaei","doi":"10.1109/ICITST.2009.5402627","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402627","url":null,"abstract":"In mobile ad hoc networks, each node acts as both host and router and performs all the routing and state maintenance. Due to the unpredictable movement of mobile nodes, the network topology of a mobile ad hoc network changes frequently. It will directly cause the routes to be broken and greatly degrade the network performance. In this paper we propose a novel Multiple Criteria approach for routing algorithm in mobile ad hoc networks, called Multiple Criteria AODV (MAODV). The proposed scheme uses the Multiple Criteria-based route strategy to select a stable route in order to enhance system performance. The Criteria of a route is decided by eight factors: the speed of nodes, the power level of battery, the Bandwidth, the RADIO-RX-SENSITIVITY, the RADIO-ANTENNA-GAIN, the PROPAGATION-LIMIT, the Frequency and the hop count. Our study also compares the performance of the MAODV protocol with the well-known Ad hoc On-Demand Distance Vector (AODV) protocol. Results obtained by a simulation campaign show that MAODV allows obtaining some important advantages that makes it a valuable candidate to operate expenses of the optimality of the solution, it results to be particularly suitable in environments where minimum signalling overhead are requested. Also simulation results show the improvement of the network performance, in terms of throughput, delay, route discovery time, data dropped and number of hops per route, when applying our algorithm to the AODV routing protocol.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Rekik, Maher Khemakhem, A. Belghith, J. Fayolle
{"title":"PKI and UDDI based trust centre: An attempt to improve web service security","authors":"W. Rekik, Maher Khemakhem, A. Belghith, J. Fayolle","doi":"10.1109/ICITST.2009.5402549","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402549","url":null,"abstract":"Nowadays Internet becomes the most used tool for the ever increasing amount of various transactions between institutions, organizations and more generally between clients and providers. Conducted studies and experiments showed that it is more convenient to provide and achieve these transactions as web services (WS) to guarantee their flexibility and their reuse. So far these services and the corresponding providers' URLs are advertised on specific UDDIs (Universal Description, Discovery and Integration). As such, after finding the requested service any given client contacts the right provider to negotiate the service access procedure. These first contacts between clients and providers are usually and commonly not protected (Encrypted) yielding enough room for Hackers to intrude into these unprotected messages. In this paper, we propose a securing approach based on both the PKI infrastructure and some proposed improvements of the UDDI functioning in an attempt to provide adequate security for web services.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generic framework for recommendation system using collective intelligence","authors":"Alkesh Patel, A. Balakrishnan","doi":"10.1109/ICITST.2009.5402612","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402612","url":null,"abstract":"Internet users are in need of a tool that helps them to explore more and more contents on the web. Web users are undergoing a transformation and they are now expressing themselves in the form of sharing their opinions on an item through ratings and reviews or comments; through sharing and tagging content; or by contributing new content. In this changing scenario, recommendation system should not only present contextually relevant items or personalized items but also show items which are hot among other users over the Web. In this paper, we propose an approach that takes users' collective intelligence through their interactions with the contents, their contribution and navigation patterns, and finally suggests best recommendations. The algorithm is independent of the type of item and can be applied to videos, music, photos, news, books, e-shopping products or any other type of items. Proposed recommendation system exploits collective intelligence through user contributed tags, overall community opinion and most common co-occurrence patterns found in users' actions. The performance of the recommendation system has been evaluated through users' tendency of clicking to the recommended items and diversity of the items being consumed by users.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water quality classification using neural networks: Case study of canals in Bangkok, Thailand","authors":"S. Areerachakul, S. Sanguansintukul","doi":"10.1109/ICITST.2009.5402577","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402577","url":null,"abstract":"Water quality is one of the major concerns of countries around the world. This study endeavors to automatically classify water quality. The water quality classes are evaluated using 3 chemical factor indices. These factors are pH value (pH), Dissolved Oxygen (DO), and Biochemical Oxygen Demand (BOD). The methodology involves applying data mining techniques using neural networks with the Levenberg-Marquardt algorithm on data from 288 canals in Bangkok, Thailand. The data is obtained from the Department of Drainage and Sewerage Bangkok Metropolitan Administration during 2003–2007. The results exhibit a high accuracy rate at 99.34% in classifying the water quality of canals in Bangkok. Subsequently, this encouraging result could be applied with more parameters and also can be extended to the related science.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web visualization support for disaster management","authors":"P. Gajdoš, M. Radecký","doi":"10.1109/ICITST.2009.5402608","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402608","url":null,"abstract":"Research project FLOREON+ deals with disaster management support. Philosophy of the project is based on its modularity which enables integration on seemingly unrelated problem domains. The research is primary focused on modeling and simulation of flood risk, traffic, and water and air pollution. Domain areas can be extended in the future. This paper is aimed at description of visualization module which represents top layer of system architecture. Emphasis is placed on 3D visualization and its data structure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129152683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noisy password security technique","authors":"K. Alghathbar, H. Mahmoud","doi":"10.1109/ICITST.2009.5402537","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402537","url":null,"abstract":"One-time password makes it more difficult to gain unauthorized access to restricted resources. In our previous work we designed a one-time password scheme that implements our noisy password scheme. The previous work proved to be a secure password entry scheme, but was somehow difficult for users. In this paper, we propose a technique for improving the security of password-based applications by incorporating predefined keystroke patterns into the password. The proposed system attempts to alleviate the problem of shoulder surfing by inserting different noise patterns in the password making. The user is authenticated by totally different password every time. The noisy password constitute of several parts, the actual password and additional noisy parts. Different password parts will be entered using keystroke patterns not characters. The noisy parts are proven to be robust against any hacking attacks. Experimental results give good indication of the ease of utilization of the new system with low error rates.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid resource discovery based on web services","authors":"D. Cokuslu, A. Hameurlain, K. Erciyes","doi":"10.1109/ICITST.2009.5402543","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402543","url":null,"abstract":"The size of grid systems has increased substantially in the last decades. Resource discovery in grid systems is a fundamental task which provides searching and locating necessary resources for a given process. Various different approaches are proposed in literature for this problem. Grid resource discovery using web services is an important approach which has resulted in many tools to become de facto standards of today's grid resource management. In this paper, we propose a survey of recent grid resource discovery studies based on web services. We provide synthesis, analysis and evaluation of these studies by classification. We also give a comparative study of different classes proposed.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission","authors":"D. Rixon, M. Furey","doi":"10.1109/ICITST.2009.5402589","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402589","url":null,"abstract":"The devolution of regulatory authority to agencies raises the issue of government's responsibility to ensure such agencies meet the needs of citizens. This paper examines the respective roles of the Canadian Radio telecommunications Commission and various levels of government in ensuring citizens receive reliable telecommunications services. This research has shown that despite the CRTC's regulation and its Quality of Service Standards, there are opportunities for all levels of government to improve their oversight roles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data","authors":"Rose Tinabo, F. Mtenzi, B. O'Shea","doi":"10.1109/ICITST.2009.5402501","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402501","url":null,"abstract":"Due to sensitivity nature of the data in e-healthcare and the need of these data to different “Healthcare Team”, privacy is one of the important issues to consider for its use. Without highly consideration of privacy issues, available data will not be useful. This results in introduction of different techniques that insist privacy protection. Anonymisation and Pseudonymisation are the main methods in privacy protection. Even though they both protect privacy, their usefulness may vary depending on the usage of the data, therefore users must be able to choose a technique to use. This paper compares characteristics of anonymisation and pseudonymisation techniques in e-healthcare. Depending on characteristics of e-healthcare data, authors proposes the use of pseudonymisation (the use of false names (pseudonym)), technique rather than anonymisation (without name) technique in e-healthcare as it will allow usage of the data to different “Healthcare Team” while protecting privacy of an individual. Also the use of different techniques to “Healthcare Team” has been proposed","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120875893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Conviviality in web systems by the wisdom of crowds","authors":"Sascha Kaufmann, Christoph Schommer","doi":"10.1109/ICITST.2009.5402530","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402530","url":null,"abstract":"We motivate the idea of e-conviviality in web-based systems and argue that a convivial social being deeply depends on the implicit and explicit co-operation and collaboration of natural users inside a community. We believe that a (individual) conviviality benefits from the wisdom of crowds, meaning that a continuously and dynamic understanding of the user's behaviour can heavily influence the individual well being. In this respect, we are currently implementing the system CUBA (conviviality and user behaviour analysis), which aims to find novel ways to support users during their web site visits while discovering their interests. CUBA comes up with certain recommendations and suggestions, which base on a common behaviour of the “Wisdom of Crowds”. For example, concepts with respect to time, space, and user-based actions are considered.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}