2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)最新文献

筛选
英文 中文
Advance Strong Authentication Strong Integrity (ASASI) Protocol for Low Cost Radio Frequency Identification 低成本射频识别的高级强认证强完整性(ASASI)协议
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538436
Madiha Khalid, U. Khokhar, M. Najam-ul-Islam
{"title":"Advance Strong Authentication Strong Integrity (ASASI) Protocol for Low Cost Radio Frequency Identification","authors":"Madiha Khalid, U. Khokhar, M. Najam-ul-Islam","doi":"10.1109/ICSCEE.2018.8538436","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538436","url":null,"abstract":"Internet of things is one of the emerging concepts in 5G networks. For global connectivity and basic identification of the wireless nodes, the RFID system plays an important role. The RFID systems provide automatic identification of the wireless nodes without the restriction of line of sight. However, security and privacy of the RFID systems are of utmost concern. Many ultralightweight authentication schemes have been proposed for secure communication between the reader and the tag. However, most of them were reported to be vulnerable against various attacks shortly after they were proposed. In this paper, we addressed this research gap and propose a new ultralightweight RFID authentication protocol ASASI (Advance Strong Authentication and Strong Integrity). The proposed protocol is extremely lightweight due to optimized design structure and can withstand against all existing attack models.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133137227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new Algorithm based on the Gbest of Particle Swarm Optimization algorithm to improve Estimation of Distribution Algorithm 基于粒子群优化算法的Gbest改进了分布估计算法
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538372
Qiuyue Zhao, Ying Gao
{"title":"A new Algorithm based on the Gbest of Particle Swarm Optimization algorithm to improve Estimation of Distribution Algorithm","authors":"Qiuyue Zhao, Ying Gao","doi":"10.1109/ICSCEE.2018.8538372","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538372","url":null,"abstract":"In recent years, with the rise of artificial intelligence and deep learning, as an evolutionary algorithm based on probability model, estimation of distribution algorithm has been widely research and development. The estimation of distribution algorithm without the traditional genetic operation such as crossover and mutation, is a new kind of evolution model. As an algorithm based on probabilistic mode, the estimation of distribution algorithm establishes a probabilistic model describing the solution space of optimization problems. With the emergence for big data, the convergence of the algorithm and the requirements for solving precision are also increasing. This paper attempts to improve the distribution estimation algorithm. The optimal population of each iteration is found through the location update of each iteration of the Particle Swarm Optimization (PSO) algorithm. The simulation test was carried out with ten benchmark test function. The proposed algorithm was compared with the GA_EDA9improved genetic algorithm) and the basic distribution estimation (EDA) algorithm. Experimental results show that the new algorithm is superior to GA_EDA and basic EDA in terms of convergence and accuracy.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134603949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Evidence Extraction Techniques in Big Data Environment 大数据环境下证据提取技术综述
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538437
S. H. Mokhtar, Gopinath Muruti, Z. Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim
{"title":"A Review of Evidence Extraction Techniques in Big Data Environment","authors":"S. H. Mokhtar, Gopinath Muruti, Z. Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim","doi":"10.1109/ICSCEE.2018.8538437","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538437","url":null,"abstract":"Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114830049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation on the Effect of Different Window Size in Segmentation for Common Sport Activity 不同窗口大小对常见体育活动分割效果的研究
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538429
N. F. Ghazali, M. A. As’ari, N. Shahar, Hadafi Fitri Mohd Latip
{"title":"Investigation on the Effect of Different Window Size in Segmentation for Common Sport Activity","authors":"N. F. Ghazali, M. A. As’ari, N. Shahar, Hadafi Fitri Mohd Latip","doi":"10.1109/ICSCEE.2018.8538429","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538429","url":null,"abstract":"Signal segmentation is one of the most important processes in the activity recognition process. So far, windowing approaches is one of the commonly used segmentation technique to segment the data. The window size used to segment the data usually chosen based on the previous study and the effect of the activity recognition performance with the changes of window size is still vague and uncertain. Thus, in this study, we investigate the effect of different window size in segmentation process for common sports activity recognition. The study was conducted on ten subjects who wore a sensor from Gait Up called as Physilogic OR 4 Silver inertial sensor on their chest while performing several common sports activities such as stationary, walking, jogging, sprinting, and jumping. Three common used classifiers which are Decision Trees, k-Neighbor Nearest and Support Vector Machine were evaluated. Among the different ranges of window sizes tested, it was found that 2.5 seconds window size represents the best trade-off in recognition of common sports activity, with an obtained accuracy above 90%. From the result, it indicates that the selection of window size in segmentation process can affect the accuracy in detecting the common sports activity. The preferably employed window size in detecting the common sports activity is determined.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Feature Detectors on Repeatability Quality of Facial Keypoints In Triangulation Method 三角剖分方法中特征检测器对人脸关键点重复性质量的评价
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538385
A. Kusnadi, Wella, R. Winantyo, I. Z. Pane
{"title":"Evaluation of Feature Detectors on Repeatability Quality of Facial Keypoints In Triangulation Method","authors":"A. Kusnadi, Wella, R. Winantyo, I. Z. Pane","doi":"10.1109/ICSCEE.2018.8538385","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538385","url":null,"abstract":"This study derived from a research focusing on 3D face recognition using ToF camera. But the system can't be used outdoors, because of a backlight. To solve this problem, a commercial digital single-lens reflex (DSLR) camera will be used. It can be approached y solving the stereo-view reconstruction problem for each pair of consecutive images. To reconstruct an object, projection matrix estimation from 2D point correspondences will be needed. The accuracy of 3D reconstruction is highly dependent on the corresponding points of 2D data projections from images to other images. In this research, The detectors are Harris-Stephens, SURF, FAST, Minimum Eigenvalue, and BRISK have been tested and analyzed through black box test. To evaluate feature detectors performance, the repeatability score for a given pair of images is computed. To do that it can use recall and precision. The best detector is the Harris Stephens detector because it has the best F-measure values of 0.46.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115862482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Class Sentiment Analysis Comparison Using Support Vector Machine (SVM) and BAGGING Technique-An Ensemble Method 基于支持向量机和BAGGING技术的多类情感分析比较——一种集成方法
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538397
Shashank Sharma, S. Srivastava, Ashish Kumar, Abhilasha Dangi
{"title":"Multi-Class Sentiment Analysis Comparison Using Support Vector Machine (SVM) and BAGGING Technique-An Ensemble Method","authors":"Shashank Sharma, S. Srivastava, Ashish Kumar, Abhilasha Dangi","doi":"10.1109/ICSCEE.2018.8538397","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538397","url":null,"abstract":"Multi-class analysis, as the term suggest is the classification of the data in more than two classes. However not much studies were focused on such analysis and researchers often confined themselves to the binary sentiment classifiers. In this paper, we proposed machine learning algorithm as an approach to predict the sentiment classification. The experiments are conducted on public data sets combined with ensemble method named BAGGING, an abbreviation for Bootstrap aggregation with 10-cross fold validation technique is used to obtain the classification accuracy. The result accuracy suggested the exploring further improvement using the combination of the multi-class sentiment classifiers.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129888997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Educational Data Mining: Classifier Comparison for the Course Selection Process 教育数据挖掘:选课过程中的分类器比较
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538434
S. Srivastava, Saif Karigar, R. Khanna, R. Agarwal
{"title":"Educational Data Mining: Classifier Comparison for the Course Selection Process","authors":"S. Srivastava, Saif Karigar, R. Khanna, R. Agarwal","doi":"10.1109/ICSCEE.2018.8538434","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538434","url":null,"abstract":"The education system in India & across the world has shown a horizontal shift instead of vertical development in one specific domain. The Engineering student in current scenario try to accumulate knowledge from various interdisciplinary course’s and develop application in respective area of study [2]–[4]. This interdisciplinary growth can also be supported and compared using various data mining techniques for future prediction and provide a mathematical foundation for the current selection of the course. This paper emphasis on one such study done for opting the open elective course at leading private university. The data mining process review, apply and compare the classification algorithms like K-NN, Support Vector machine with radial basis kernel. The paper also aims at adopting the data mining techniques as the mathematical foundation for the heuristic process being used till date.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125785461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated Essay Scoring with Ontology based on Text Mining and NLTK tools 基于文本挖掘和NLTK工具的本体自动作文评分
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538399
Jennifer O. Contreras, Shadi M. S. Hilles, Zainab Binti Abubakar
{"title":"Automated Essay Scoring with Ontology based on Text Mining and NLTK tools","authors":"Jennifer O. Contreras, Shadi M. S. Hilles, Zainab Binti Abubakar","doi":"10.1109/ICSCEE.2018.8538399","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538399","url":null,"abstract":"One of the common learning activities used in educational levels and disciplines is essay writing. The problems of the essay writing activities are time-consuming, concerns in producing immediate result and/or feedback from teachers to students, and the teachers tend to be subjective in grading the essay activities. The study aims to apply the preliminary approach forautomatically generating the domain concept ontology in essays using OntoGen and applied natural language processing algorithms using NLTK (Natural Language Tool Kit) that enhance the teachers essay grading.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering 基于Gabor描述符和K-Means聚类的复制-移动图像伪造检测
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538432
H. Parvez, S. Sadeghi, H. Jalab, Ala'a R. Al-Shamasneh, Diaa M. Uliyan
{"title":"Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering","authors":"H. Parvez, S. Sadeghi, H. Jalab, Ala'a R. Al-Shamasneh, Diaa M. Uliyan","doi":"10.1109/ICSCEE.2018.8538432","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538432","url":null,"abstract":"At present, popularity of using image as the fundamental media of information is growing. Rapid development of technology brings effective image processing tools available and makes image forgery very easy. As an outcome, it turns into a complicated issue in late time. In that case, validating the legitimacy and integrity of digital images is ending up progressively vital issue. The most challenging region-duplication forgery is made by copying some portion of an image and pasting on different region of the same image. This study proposes an efficient region-duplication forgery detection technique. This research is categorized into segment-based region duplication forgery detection method. The design of the algorithm based on image segmentation and using Gabor descriptors and K-Means clustering. Initially, the image is segmented using normalized cut (NCut) segmentation technique. Then, applied Gabor Filters to extract image features and cluster similar features using KMeans clustering algorithm. Finally, comparing the clustering regions with the given threshold value will decide image authenticity. Experiment results proves the strength of the proposed method against various post-processing attacks such as rotation, scale, blurring and JPEG compression. A comparison with existing image forgery detection algorithms demonstrates that the proposed algorithm gives better performance.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127222374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信