2015 7th Conference on Information and Knowledge Technology (IKT)最新文献

筛选
英文 中文
The More the Safe, the Less the Unsafe: An efficient method to unauthenticated packets detection in WSNs 越安全越不安全:无线传感器网络中一种有效的未经认证报文检测方法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-10-05 DOI: 10.1109/IKT.2015.7288771
M. Kamarei, Amir Hossein Nasrollah Barati, A. Patooghy, M. Fazeli
{"title":"The More the Safe, the Less the Unsafe: An efficient method to unauthenticated packets detection in WSNs","authors":"M. Kamarei, Amir Hossein Nasrollah Barati, A. Patooghy, M. Fazeli","doi":"10.1109/IKT.2015.7288771","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288771","url":null,"abstract":"This paper proposes an efficient method to unauthenticated packets detection in Wireless Sensor Networks (WSNs). Unauthenticated packets are broadcasted within the network by attacker nodes to increase in the network energy consumption as well as the network congestion. Proposed method uses the More the Safe, the Less the Unsafe, MSLU, policy to unauthenticated packets detection. Based on MSLU policy, if after each event occurrence several sensor nodes report it to a base station, then this event occurrence report with high probably is an authenticated event. On the other hand, unauthenticated packets with high probably are made and injected within the network by an attacker node. In the more the safe, the less the unsafe policy, sensor nodes do not tend to relay packets that have been made by a node. WSNs are event-driven networks with many to one traffic pattern. Of course, WSNs are very redundant, so each point within the network is covered by more than one sensor node. Since, the more the safe, the less the unsafe policy, considers an occurred event must be reported by several sensor nodes. Simulation results that have been implemented via NS-2 simulator show that the proposed method detects more than 85% unauthenticated packets in average.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A secure watermark embedding approach based on chaotic map for image tamper detection 一种基于混沌映射的安全水印嵌入方法用于图像篡改检测
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-10-05 DOI: 10.1109/IKT.2015.7288809
M. Barani, Milad Yousefi Valandar, P. Ayubi
{"title":"A secure watermark embedding approach based on chaotic map for image tamper detection","authors":"M. Barani, Milad Yousefi Valandar, P. Ayubi","doi":"10.1109/IKT.2015.7288809","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288809","url":null,"abstract":"Authentication is an important concept in transferring data such as images, videos and etc. In this paper, a new authentication method based on watermark embedding is proposed which makes us able to detect and localize forged areas in the image. In this method, picture is divided into 2 × 2 blocks and it permuted with a chaotic map and placed into an array, which this array is combined with sequence that generated by Jacobian elliptic map with XOR. Obtained authentication sequence is inserted directly into least significant bits of each pixel in cover image because Inserting data in spatial domain increases image visual quality and using chaotic map in embedding process increase security of proposed algorithm. Results of implementation and testing the proposed technique shows good visual quality and power of localizing tampered areas.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A new band selection method for hyperspectral images based on constrained optimization 基于约束优化的高光谱图像波段选择新方法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-10-05 DOI: 10.1109/IKT.2015.7288779
Elahe Gharaati, Mehdi Nasri
{"title":"A new band selection method for hyperspectral images based on constrained optimization","authors":"Elahe Gharaati, Mehdi Nasri","doi":"10.1109/IKT.2015.7288779","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288779","url":null,"abstract":"One of the new techniques in remote sensing is hyperspectral Imagery (HSI). HIS has found many applications in agriculture, environmental science, etc. Due to the large number of spectral bands in HIS, It is difficult and time-consuming to extract information from it. So, the image band selection is an inevitable step. Band selection is done based on the selection of optimum bands in the image based on some pre-defined criteria. In this paper, a new constrained method for band selection is proposed. In the proposed method, the number of bands is considered fixed, and the method must choose the best combination of bands. To do this, another step is added to the classic Genetic Algorithm to satisfy the constraint whilst the optimization problem is done. Experimental results show that the proposed constrained optimization method outperform classic methods in this field in the terms of overall accuracy.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent classification of ECG signals to distinguish between pre and on-music states 智能分类心电信号,区分音乐前和音乐后的状态
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-10-05 DOI: 10.1109/IKT.2015.7288790
Soheila Hajizadeh, A. Abbasi, Atefeh Goshvarpour
{"title":"Intelligent classification of ECG signals to distinguish between pre and on-music states","authors":"Soheila Hajizadeh, A. Abbasi, Atefeh Goshvarpour","doi":"10.1109/IKT.2015.7288790","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288790","url":null,"abstract":"In this work, the classification of heart signals affected by music is investigated. The nonlinear and chaotic nature of ECG signals makes it desirable to develop and apply an intelligent mechanism for efficient signal classification. Afterwards, extracting the recognizable and functional features plays a significant role in classification accuracy. Empirical mode decomposition (EMD), as an adaptive mathematical analysis is applied to decompose the signals into a sum of components each called an intrinsic mode function (IMF). IMF values are applied to determine whether the changes in signal features are experimentally significant due to the music. The performance of two practical classification methods is reported to determine the most efficient input-output relationship between music and heart signals. Experimental results over 62 cases, validates the generalization capability of the proposed method and perform acceptable values of MSE for the classification process. Elman recurrent neural network (ERNN) performed most effectively in classifying the maximum frequency (MaxFreq) and sample entropy (SampEn) of IMF (2). However, results reflect the considerable potential of feed-forward neural network (FFNN) for the classification of maximum amplitude of FFT (MaxFFT) and MaxFreq of IMF (1).","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new method for evaluating cloud computing user behavior trust 一种新的云计算用户行为信任评估方法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288735
Seyedeh Bahare Hosseini, Aida Shojaee, N. Agheli
{"title":"A new method for evaluating cloud computing user behavior trust","authors":"Seyedeh Bahare Hosseini, Aida Shojaee, N. Agheli","doi":"10.1109/IKT.2015.7288735","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288735","url":null,"abstract":"Cloud computing is a model for networking universal, easy and on demand access to a set of computing resources that can be quickly interfering with minimum labor, or require the service provider to be provisioned. One of the issues discussed in cloud computing, is user behavior trust in cloud services. For trusted services and users' satisfaction in the context of cloud computing behavior trust of each user should be assessed. Cloud computing subscribers, including members, local organizations and distributed resources should built trustworthy relationships among entities which are linked together. Relationships are based on trust. In this paper we proposed a new method for user behavior trust evaluation that considers user's identification code and mac address to prevent the registration of members with multiple user names and makes available the information of user behavior trust in other cloud computing environments. Also, in calculating the amount of user behavior trust assigns a negative score for repeated disruptive behaviors. This method rely on the user behavior from the perspective of service providers in the 6-step measures and considers the new scores of user, behavior scores rated in the past, the scores of the other entities and scores of other cloud computing provider's to the user. Principles are presented for calculating scores and total confidence to the end user is obtained as a score. The method helps identify malicious users and negative behaviors. Finally we compare proposed model with other models of user behavior evaluation that use principles and show the effectiveness of model in detecting malicious behavior and users.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Novel resource assignment method for balancing the Inter-Cell Interference in OFDM cellular networks OFDM蜂窝网络中平衡小区间干扰的资源分配新方法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288666
H. Yazdi, M. Khayyambashi, B. S. Ghahfarokhi
{"title":"Novel resource assignment method for balancing the Inter-Cell Interference in OFDM cellular networks","authors":"H. Yazdi, M. Khayyambashi, B. S. Ghahfarokhi","doi":"10.1109/IKT.2015.7288666","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288666","url":null,"abstract":"In this paper, a novel Inter-Cell Interference Coordination (ICIC) scheme is proposed to mitigate the downlink inter-cell interference (ICI) in Long Term Evolution (LTE) networks. The proposed method partitions the cells into 3 regions and uses predefined resource allocation schemes to assign the resources to each cell of the cluster. The proposed method also introduces an interference balancing method between neighboring cells based on an inter-cell coordination mechanism. Simulation results show that the proposed scheme is better than compared schemes. The results also show that the scheme can greatly improve the spectral efficiency of system and users although it reduces the user level fairness.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature subset selection using Information Energy and correlation coefficients of hesitant fuzzy sets 利用犹豫模糊集的信息能量和相关系数选择特征子集
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288746
M. K. Ebrahimpour, M. Eftekhari
{"title":"Feature subset selection using Information Energy and correlation coefficients of hesitant fuzzy sets","authors":"M. K. Ebrahimpour, M. Eftekhari","doi":"10.1109/IKT.2015.7288746","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288746","url":null,"abstract":"In this paper, a novel feature selection algorithm based on hesitant fuzzy sets (HFS) is proposed. For each feature two HFSs are defined.For generating the first HFS for each defining feature, the opinions of three different ranking algorithms are considered. For second HFS for each feature the opinions of three different proximity measures are considered. The Information Energy (IE) of the first HFS for each feature is considered as the relevancy measure of the feature to the class labels. Then the hesitant correlation coefficient matrix for features is calculated based on the second HFSs. After that the average of hesitant correlation coefficients is considered as the relevancy measure of selected features. By combining hesitant based relevancy and redundancy measures, a new feature selection merit is proposed. The proposed merit potentially is able to consider both the maximum relevancy and the minimum redundancy of selected features. The efficiency of this approach is proved through 9 UCI repository datasets. The approach demonstrates a significant performance in both number of selected features and classification accuracy by four different classifiers.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sender based adaptive VoIP quality improvement using constructive feedback 基于发送方的基于建设性反馈的自适应VoIP质量改进
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288752
Ehsan Faghihi, M. Behdadfar, M. E. Sadeghi
{"title":"Sender based adaptive VoIP quality improvement using constructive feedback","authors":"Ehsan Faghihi, M. Behdadfar, M. E. Sadeghi","doi":"10.1109/IKT.2015.7288752","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288752","url":null,"abstract":"QoS analysis of VoIP traffic is inevitable in quality improvement of multimedia converged networks. Therefore, adaptive speech quality improvement is vital for managing the VoIP communication quality in order to meet users' quality expectations and decrease utilized resources. This paper proposes a new approach for augmenting the real-time VoIP communication quality and tries to explore its impact on VoIP QoS parameters. The scheme includes different voice codecs and different voice payload sizes for each codec. Simulation results show that the proposed scheme leads to superior VoIP quality compared to some existing algorithms.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new computer vision algorithm for classification of POLSAR images 一种新的POLSAR图像分类计算机视觉算法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288776
Zahra Faraji, G. Akbarizadeh
{"title":"A new computer vision algorithm for classification of POLSAR images","authors":"Zahra Faraji, G. Akbarizadeh","doi":"10.1109/IKT.2015.7288776","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288776","url":null,"abstract":"Extracting good representations from POLSAR images is essential for many computer vision tasks. In this paper, we propose hierarchical matching pursuit (HMP), which builds a feature hierarchy layer-by-layer using an efficient matching pursuit encoder. The algorithm proposed in this paper, was applied on a POLSAR image and the result demonstrates that the extracted features using the proposed computer vision algorithm is an effective and useful method for classification of POLSAR images.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125958105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A MapReduce-based algorithm for parallelizing collusion detection in Hadoop Hadoop中基于mapreduce的并行串通检测算法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288760
M. Mortazavi, B. T. Ladani
{"title":"A MapReduce-based algorithm for parallelizing collusion detection in Hadoop","authors":"M. Mortazavi, B. T. Ladani","doi":"10.1109/IKT.2015.7288760","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288760","url":null,"abstract":"MapReduce as a programming model for parallel data processing has been used in many open systems such as cloud computing and service-oriented computing. Collusive behavior of worker entities in MapReduce model can violate integrity concern of open systems. In this paper, a MapReduce-based algorithm for parallel collusion detection of malicious workers has been proposed. This algorithm uses a voting matrix that is represented as a list of voting values of different workers. Three phases of majority selection, correlation counting and correlation computing are designed and implemented in this paper. Preliminary results show that speedup of 1.8 and efficiency of about 70% is achieved using data set containing 2000 worker's votes.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126499549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信