2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks 多准则路由算法在移动自组织网络中增加持久路径
S. Tabatabaei
{"title":"Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks","authors":"S. Tabatabaei","doi":"10.1109/ICITST.2009.5402627","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402627","url":null,"abstract":"In mobile ad hoc networks, each node acts as both host and router and performs all the routing and state maintenance. Due to the unpredictable movement of mobile nodes, the network topology of a mobile ad hoc network changes frequently. It will directly cause the routes to be broken and greatly degrade the network performance. In this paper we propose a novel Multiple Criteria approach for routing algorithm in mobile ad hoc networks, called Multiple Criteria AODV (MAODV). The proposed scheme uses the Multiple Criteria-based route strategy to select a stable route in order to enhance system performance. The Criteria of a route is decided by eight factors: the speed of nodes, the power level of battery, the Bandwidth, the RADIO-RX-SENSITIVITY, the RADIO-ANTENNA-GAIN, the PROPAGATION-LIMIT, the Frequency and the hop count. Our study also compares the performance of the MAODV protocol with the well-known Ad hoc On-Demand Distance Vector (AODV) protocol. Results obtained by a simulation campaign show that MAODV allows obtaining some important advantages that makes it a valuable candidate to operate expenses of the optimality of the solution, it results to be particularly suitable in environments where minimum signalling overhead are requested. Also simulation results show the improvement of the network performance, in terms of throughput, delay, route discovery time, data dropped and number of hops per route, when applying our algorithm to the AODV routing protocol.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PKI and UDDI based trust centre: An attempt to improve web service security 基于PKI和UDDI的信任中心:改进web服务安全性的尝试
W. Rekik, Maher Khemakhem, A. Belghith, J. Fayolle
{"title":"PKI and UDDI based trust centre: An attempt to improve web service security","authors":"W. Rekik, Maher Khemakhem, A. Belghith, J. Fayolle","doi":"10.1109/ICITST.2009.5402549","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402549","url":null,"abstract":"Nowadays Internet becomes the most used tool for the ever increasing amount of various transactions between institutions, organizations and more generally between clients and providers. Conducted studies and experiments showed that it is more convenient to provide and achieve these transactions as web services (WS) to guarantee their flexibility and their reuse. So far these services and the corresponding providers' URLs are advertised on specific UDDIs (Universal Description, Discovery and Integration). As such, after finding the requested service any given client contacts the right provider to negotiate the service access procedure. These first contacts between clients and providers are usually and commonly not protected (Encrypted) yielding enough room for Hackers to intrude into these unprotected messages. In this paper, we propose a securing approach based on both the PKI infrastructure and some proposed improvements of the UDDI functioning in an attempt to provide adequate security for web services.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generic framework for recommendation system using collective intelligence 基于集体智能的推荐系统通用框架
Alkesh Patel, A. Balakrishnan
{"title":"Generic framework for recommendation system using collective intelligence","authors":"Alkesh Patel, A. Balakrishnan","doi":"10.1109/ICITST.2009.5402612","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402612","url":null,"abstract":"Internet users are in need of a tool that helps them to explore more and more contents on the web. Web users are undergoing a transformation and they are now expressing themselves in the form of sharing their opinions on an item through ratings and reviews or comments; through sharing and tagging content; or by contributing new content. In this changing scenario, recommendation system should not only present contextually relevant items or personalized items but also show items which are hot among other users over the Web. In this paper, we propose an approach that takes users' collective intelligence through their interactions with the contents, their contribution and navigation patterns, and finally suggests best recommendations. The algorithm is independent of the type of item and can be applied to videos, music, photos, news, books, e-shopping products or any other type of items. Proposed recommendation system exploits collective intelligence through user contributed tags, overall community opinion and most common co-occurrence patterns found in users' actions. The performance of the recommendation system has been evaluated through users' tendency of clicking to the recommended items and diversity of the items being consumed by users.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Water quality classification using neural networks: Case study of canals in Bangkok, Thailand 利用神经网络进行水质分类:以泰国曼谷运河为例
S. Areerachakul, S. Sanguansintukul
{"title":"Water quality classification using neural networks: Case study of canals in Bangkok, Thailand","authors":"S. Areerachakul, S. Sanguansintukul","doi":"10.1109/ICITST.2009.5402577","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402577","url":null,"abstract":"Water quality is one of the major concerns of countries around the world. This study endeavors to automatically classify water quality. The water quality classes are evaluated using 3 chemical factor indices. These factors are pH value (pH), Dissolved Oxygen (DO), and Biochemical Oxygen Demand (BOD). The methodology involves applying data mining techniques using neural networks with the Levenberg-Marquardt algorithm on data from 288 canals in Bangkok, Thailand. The data is obtained from the Department of Drainage and Sewerage Bangkok Metropolitan Administration during 2003–2007. The results exhibit a high accuracy rate at 99.34% in classifying the water quality of canals in Bangkok. Subsequently, this encouraging result could be applied with more parameters and also can be extended to the related science.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web visualization support for disaster management 灾难管理的Web可视化支持
P. Gajdoš, M. Radecký
{"title":"Web visualization support for disaster management","authors":"P. Gajdoš, M. Radecký","doi":"10.1109/ICITST.2009.5402608","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402608","url":null,"abstract":"Research project FLOREON+ deals with disaster management support. Philosophy of the project is based on its modularity which enables integration on seemingly unrelated problem domains. The research is primary focused on modeling and simulation of flood risk, traffic, and water and air pollution. Domain areas can be extended in the future. This paper is aimed at description of visualization module which represents top layer of system architecture. Emphasis is placed on 3D visualization and its data structure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129152683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Noisy password security technique 噪声密码安全技术
K. Alghathbar, H. Mahmoud
{"title":"Noisy password security technique","authors":"K. Alghathbar, H. Mahmoud","doi":"10.1109/ICITST.2009.5402537","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402537","url":null,"abstract":"One-time password makes it more difficult to gain unauthorized access to restricted resources. In our previous work we designed a one-time password scheme that implements our noisy password scheme. The previous work proved to be a secure password entry scheme, but was somehow difficult for users. In this paper, we propose a technique for improving the security of password-based applications by incorporating predefined keystroke patterns into the password. The proposed system attempts to alleviate the problem of shoulder surfing by inserting different noise patterns in the password making. The user is authenticated by totally different password every time. The noisy password constitute of several parts, the actual password and additional noisy parts. Different password parts will be entered using keystroke patterns not characters. The noisy parts are proven to be robust against any hacking attacks. Experimental results give good indication of the ease of utilization of the new system with low error rates.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Grid resource discovery based on web services 基于web服务的网格资源发现
D. Cokuslu, A. Hameurlain, K. Erciyes
{"title":"Grid resource discovery based on web services","authors":"D. Cokuslu, A. Hameurlain, K. Erciyes","doi":"10.1109/ICITST.2009.5402543","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402543","url":null,"abstract":"The size of grid systems has increased substantially in the last decades. Resource discovery in grid systems is a fundamental task which provides searching and locating necessary resources for a given process. Various different approaches are proposed in literature for this problem. Grid resource discovery using web services is an important approach which has resulted in many tools to become de facto standards of today's grid resource management. In this paper, we propose a survey of recent grid resource discovery studies based on web services. We provide synthesis, analysis and evaluation of these studies by classification. We also give a comparative study of different classes proposed.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission 谁监管监管机构:加拿大广播电视和电信委员会的监管
D. Rixon, M. Furey
{"title":"Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission","authors":"D. Rixon, M. Furey","doi":"10.1109/ICITST.2009.5402589","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402589","url":null,"abstract":"The devolution of regulatory authority to agencies raises the issue of government's responsibility to ensure such agencies meet the needs of citizens. This paper examines the respective roles of the Canadian Radio telecommunications Commission and various levels of government in ensuring citizens receive reliable telecommunications services. This research has shown that despite the CRTC's regulation and its Quality of Service Standards, there are opportunities for all levels of government to improve their oversight roles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data 匿名与假名:哪一种对隐私保护和电子医疗数据的有用性都最有用
Rose Tinabo, F. Mtenzi, B. O'Shea
{"title":"Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data","authors":"Rose Tinabo, F. Mtenzi, B. O'Shea","doi":"10.1109/ICITST.2009.5402501","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402501","url":null,"abstract":"Due to sensitivity nature of the data in e-healthcare and the need of these data to different “Healthcare Team”, privacy is one of the important issues to consider for its use. Without highly consideration of privacy issues, available data will not be useful. This results in introduction of different techniques that insist privacy protection. Anonymisation and Pseudonymisation are the main methods in privacy protection. Even though they both protect privacy, their usefulness may vary depending on the usage of the data, therefore users must be able to choose a technique to use. This paper compares characteristics of anonymisation and pseudonymisation techniques in e-healthcare. Depending on characteristics of e-healthcare data, authors proposes the use of pseudonymisation (the use of false names (pseudonym)), technique rather than anonymisation (without name) technique in e-healthcare as it will allow usage of the data to different “Healthcare Team” while protecting privacy of an individual. Also the use of different techniques to “Healthcare Team” has been proposed","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120875893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
e-Conviviality in web systems by the wisdom of crowds 通过群体智慧实现网络系统中的电子娱乐
Sascha Kaufmann, Christoph Schommer
{"title":"e-Conviviality in web systems by the wisdom of crowds","authors":"Sascha Kaufmann, Christoph Schommer","doi":"10.1109/ICITST.2009.5402530","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402530","url":null,"abstract":"We motivate the idea of e-conviviality in web-based systems and argue that a convivial social being deeply depends on the implicit and explicit co-operation and collaboration of natural users inside a community. We believe that a (individual) conviviality benefits from the wisdom of crowds, meaning that a continuously and dynamic understanding of the user's behaviour can heavily influence the individual well being. In this respect, we are currently implementing the system CUBA (conviviality and user behaviour analysis), which aims to find novel ways to support users during their web site visits while discovering their interests. CUBA comes up with certain recommendations and suggestions, which base on a common behaviour of the “Wisdom of Crowds”. For example, concepts with respect to time, space, and user-based actions are considered.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信