2015 International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Outputs analysis and dual immersion method for chaotic systems 混沌系统的输出分析与双浸入法
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-04 DOI: 10.1109/CCCS.2015.7374138
K. Langueh, O. Datcu, J. Barbot, G. Zheng, K. Busawon
{"title":"Outputs analysis and dual immersion method for chaotic systems","authors":"K. Langueh, O. Datcu, J. Barbot, G. Zheng, K. Busawon","doi":"10.1109/CCCS.2015.7374138","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374138","url":null,"abstract":"When secure data transmission is implemented through chaotic systems, the choice of the output is a preliminary problem. In this paper, the quality of the transmitted information is analysed with respect to the observability concept, for each potential output. More-over, in order to overcome observability loss, a dual immersion technique is proposed.The use of high order sliding mode observer on a well known Lorenz system, allows to highlight the well founded of the proposed analysis and method.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UOM Multimodal face and ear database 多模态面部和耳朵数据库
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374195
N. Boodoo-Jahangeer, S. Baichoo
{"title":"UOM Multimodal face and ear database","authors":"N. Boodoo-Jahangeer, S. Baichoo","doi":"10.1109/CCCS.2015.7374195","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374195","url":null,"abstract":"Research in biometrics have received increased attention in the past decades. Existing face and ear dataases have been described and compared. Some databases may not have enough number of subjects or images per subject to allow proper evaluation of algorithms. In order to support the development of algorithms for biometrics, especially for face and ear, a new database, the UOM Multimodal database has been created. This database involves images taken by more than 100 volunteers at the University of Mauritius. The images are taken under different lighting and various pose. At least 80 images per subject are available in the database.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distribution methods of web pages and testing 网页的分发方法和测试
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374212
Neelaksh Sheel, K. S. Vaisla
{"title":"Distribution methods of web pages and testing","authors":"Neelaksh Sheel, K. S. Vaisla","doi":"10.1109/CCCS.2015.7374212","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374212","url":null,"abstract":"Publishing the contents through internet we need a medium i.e Web browser. Hyper Text Markup Language is very helpful for writing the web contents and by the help of web browsers we publish our page on net. It is invented as an application so that people can take advantage to view immobile web pages in succession. Technologies improves and the web sites gain more advance features and have dynamic web applications with the exchanging of contents from other websites, similarly browsers features have turn out to be multi-principal operating surroundings with shared resources with commonly trustable web site principals. Internet Explorer, Google Chrome, Mozila Firefox and many more have a multiple key principal operating system assembly that gives a facility of web browser. The constrained control to supervise the protection of all machine resources for the collected web page is based on the defined rules. An intranet is not a public network with the surfing limitation to one organization. It uses the same technical principles and procedure as the international public internet. Internet is the most apparent opportunity for publishing the web pages but we may need to limit the sharing of our web pages to a local internet inside the group, instead of making this web page availability for public. We can share out our web pages on local memory of personal computer or server. This paper covers all the publishing options and offers guidance for designing web page and the distribution methods. It also covers the basics testing methods of published web pages.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of LSP features for text independent speaker identification LSP特征在文本无关说话人识别中的有效性
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374210
S. V. Chougule, M. Chavan
{"title":"Effectiveness of LSP features for text independent speaker identification","authors":"S. V. Chougule, M. Chavan","doi":"10.1109/CCCS.2015.7374210","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374210","url":null,"abstract":"The speech features used for speaker recognition should uniquely reflect characteristics of the speaker's vocal tract apparatus and contain negligible information about the linguistic contents in the speech. Cepstral features such as Linear Predictive Spectral Coefficients (LPCCs) and Mel Frequency Cepstral Coefficients (MFCCs) are most commonly used features for speaker recognition task, but found to be sensitive to noise and distortion. Other complementary features used initially for speech recognition can be found useful for speaker recognition task. In this work, Line Spectral Pair (LSP) features (derived from baseline linear predictive coefficients) are used for text independent speaker identification. In LSP features, power spectral density at any frequency tends to depend only on close to the respective LSP. In contrast, for cepstral features, changes in particular parameter affects the whole spectrum. The goal here is to investigate the performance of line spectral pair (LSP) features against conventional cepstral features in the presence of acoustic disturbance. Experimentation is carried out using TIMIT and NTIMIT dataset to analyze the performance in case of acoustic and channel distortions. It is observed that the LSP features perform equally well to conventional cepstral features on TIMIT dataset and have showed enhanced identification results on NTIMIT datasets.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of an automatic staff availability tracking system 设计和实施自动员工可用性跟踪系统
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374198
Kyle Stone, J. Spies
{"title":"Design and implementation of an automatic staff availability tracking system","authors":"Kyle Stone, J. Spies","doi":"10.1109/CCCS.2015.7374198","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374198","url":null,"abstract":"This paper presents the design and implementation of an automatic lecturer availability tracking system incorporating various software and hardware technologies. The system is aimed at reducing the amount of time that students, visitors and faculty members spend looking for specific employees without being hindered by the ethical issues surrounding RFID based staff tracking. It focuses on the availability of the staff members within their allocated office space. The system is currently being tested and is performing well enough to provide clients and other staff members with realtime information regarding staff member availability and essential contact information.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129911202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposed model for evaluation of mHealth systems 提议的移动医疗系统评估模型
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374199
Chel-Marí Spies
{"title":"Proposed model for evaluation of mHealth systems","authors":"Chel-Marí Spies","doi":"10.1109/CCCS.2015.7374199","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374199","url":null,"abstract":"Advances in mobile health (mHealth) has been notable in the last few years, but so has the problems associated with the development, implementation and sustained use of mHealth systems. After implementation, various difficulties arise contributing to being considered a failure. The purpose of the study is to create a model by which e-Health systems can be evaluated in order to ensure development for sustained use, with attention focused on aspects identified through literature. The author examines problems identified in previous research to establish difficulties and shortfalls regarding the perceived success of said systems. Patient and healthcare practitioner points-of-view, along with software and hardware considerations are taken into account. The investigation determines that the use of IT in mHealth is still dependent on serious factors influencing the realization of success of well-established as well as newly developed systems. These concerns undermine the effectiveness and usefulness of the improvement and efficiency of healthcare facilities and knowledge as a whole. The author proposes a model against which developed and developing mHealth systems can be measured in order to promote continued usage of implemented systems. This study sheds new light on little recognized issues for bringing concept and practice together in a useful, uninterrupted, and unending manner.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"604 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Depiction of experimental findings for a cloud enterprise architecture 描述云企业架构的实验结果
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374185
P. Mvelase, N. Dlodlo, H. Sithole, M. Adigun
{"title":"Depiction of experimental findings for a cloud enterprise architecture","authors":"P. Mvelase, N. Dlodlo, H. Sithole, M. Adigun","doi":"10.1109/CCCS.2015.7374185","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374185","url":null,"abstract":"Research and commercial efforts are currently addressing challenges and providing solutions in cloud computing. Business models are emerging to address different use scenarios of cloud computing. In this paper, we present a virtual enterprise (VE) model of cloud computing to enable Small, Medium and Micro Enterprises (SMMEs) to respond quickly to customers' demands and market opportunities, therefore Enabling Small, Medium, and Micro Enterprises through Cloud utility Infrastructure: gaining agility and flexibility needed for business success. In our virtual enterprise model, temporary co-operations are created to realize the value of a short term business opportunity that the partner SMMEs cannot (or can, but only to a lesser extent) capture on their own. This model is based on the realization that it is not economically viable for SMMEs to acquire their own private cloud infrastructure or even subscribe to public cloud services as a single entity. The pricing model obtained from our proposed business model shows the benefits that are derived from using the VE cloud model over subscription to public cloud as a single business enterprise. The pricing structure of our YE cloud model is up to 17.82 times economical compared with equivalent Amazon EC2 instance type pricing model.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey of Context-aware Recommender System and services 上下文感知推荐系统和服务的调查
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374144
Ebunoluwa Ashley-Dejo, S. Ngwira, T. Zuva
{"title":"A survey of Context-aware Recommender System and services","authors":"Ebunoluwa Ashley-Dejo, S. Ngwira, T. Zuva","doi":"10.1109/CCCS.2015.7374144","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374144","url":null,"abstract":"The advancement of the Internet, mobile and wireless technologies have produced a rapid change of information in terms of volume and accessibility. The enormous volume of information can be devastating especially to mobile users exceeding human ability to differentiate information which is relevant and that which is irrelevant. For many yzears now, recommender system have become well-known, and have been studied in various domains such as e-learning, online shopping, tourism to help overcome information overload. Recommendations are produced based on users who have interests in a particular thing or item. This recommendation process was further enhanced by incorporating context such as time, weather, and location to make recommendations more accurate and efficient. However, these systems have introduced context-aware recommender systems. This paper presents a survey of Context-aware recommender systems, the background and algorithms of Context-aware Recommender System, and also discusses the open issues of context-aware recommender systems.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
How to detect unknown malicious code efficiently? 如何有效检测未知恶意代码?
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374162
Jaehee Lee, Hyoungjun Kim, H. Yoon, Kyungho Lee
{"title":"How to detect unknown malicious code efficiently?","authors":"Jaehee Lee, Hyoungjun Kim, H. Yoon, Kyungho Lee","doi":"10.1109/CCCS.2015.7374162","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374162","url":null,"abstract":"Recently, rapid developments of IT technology lead to development of various platforms. With the development of the new platforms, diverse malicious codes are created to target the new platforms. These new malicious code means critical and new threat to national infrastructure, especially the important ones that can lead to social chaos. In Korea, Korea hydro and nuclear power was hacked and blueprint was stolen, which was later posted on-line. This created great problem as the place was hacked was critical infrastructure. Thus, the vaccine related are searched out as effective method to analyze the malicious codes that are created every day uncontrollably. However, Personals that manage malicious codes are limited compared to newly create malicious codes. How to detect unknown malicious code efficiently that remain to be unanswered? However, to answer this question, malicious code analysis method has to be concerned, especially the critical ones first. In order to analyze the Unknown malicious codes effectively, Unknown malicious code detection model was introduced in the previous paper. However, this model sometimes treated normal file as malicious code. This eventually decreased its effectiveness in finding and analyzing the malicious codes. . Thus it became necessary to decrease the misdetection rate in order to increase the effectiveness of the model. As a result in this research, we created specific conditions that lead to decrease the miss detection rate significantly. Hence in this paper, we presented a method that detects the Unknown malicious codes more efficiently.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Rule Extraction by augmenting internal representation of feed forward neural network 增强前馈神经网络内部表示的规则提取方法
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374207
V. Srivastava, Chitra Dhavale, S. Misra
{"title":"Enhanced Rule Extraction by augmenting internal representation of feed forward neural network","authors":"V. Srivastava, Chitra Dhavale, S. Misra","doi":"10.1109/CCCS.2015.7374207","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374207","url":null,"abstract":"Human readable symbols are extracted from a trained neural network using Rule Extraction Techniques. In this paper internal representation of feed forward neural network is augmented by a distance term to produce fewer rules. This paper presents an efficient method to extract fewer rules from multilayer feed forward neural network. The proposed method calculates distance between activation values of hidden units for a given input values and moves them depending on the calculated distance value. The method shows fewer rules on three publicly available data sets without compromising classification accuracy.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信