2015 7th Conference on Information and Knowledge Technology (IKT)最新文献

筛选
英文 中文
Automatic signature generation for polymorphic worms by combination of token extraction and sequence alignment approaches 基于令牌提取和序列比对方法的多态蠕虫签名自动生成
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288733
Razieh Eskandari, M. Shajari, Asadallah Asadi
{"title":"Automatic signature generation for polymorphic worms by combination of token extraction and sequence alignment approaches","authors":"Razieh Eskandari, M. Shajari, Asadallah Asadi","doi":"10.1109/IKT.2015.7288733","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288733","url":null,"abstract":"As modern worms spread quickly; any countermeasure based on human reaction is barely fast enough to thwart the threat. Moreover, because polymorphic worms could generate mutated instances, they are more complex than non-mutating ones. Currently, the content-based signature generation of polymorphic worms is a challenge for network security. Several signature classes have been proposed for polymorphic worms. Although previously proposed schemes consider patterns such as 1-byte invariants and distance restrictions, they could not handle neither large payloads nor the big size pool of worm instances. Moreover, they are prone to noise injection attack. We proposed a method to combine two approaches of creating a polymorphic worm signature in a new way that avoid the limitation of both approaches. The proposedsignature generation scheme is based on token extraction and multiple sequence alignment, widely used in Bioinformatics. This approach provides speed, accuracy, and flexibility in terms of noise tolerance. The evaluations demonstrate these claims.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A fuzzy clustering based mobility-adaptive routing protocol for wireless sensor networks 一种基于模糊聚类的无线传感器网络移动自适应路由协议
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288768
M. Mafakheri, S. Hosseinzadeh
{"title":"A fuzzy clustering based mobility-adaptive routing protocol for wireless sensor networks","authors":"M. Mafakheri, S. Hosseinzadeh","doi":"10.1109/IKT.2015.7288768","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288768","url":null,"abstract":"Mobility in cluster based wireless sensor networks is reminder of a new challenge that is not considered as an important issue is traditional protocols designed for static environments. This new challenge is packet delivery. When nodes leave their cluster zone, they no longer can send data to the cluster head, and they have to find as soon as possible a new cluster head. By increasing mobility in the network, this situation becomes worse. To address this issue an adaptive protocol needed to reduce the packet loss by selecting better cluster heads and assign a new cluster head to mobile nodes in order to avoid more packet loss. In this paper we proposed MACP-FL, a mobility adaptive clustering protocol proposed for mobile wireless sensor networks. In setup phase of our protocol, we used FCM algorithm to divide the network into several clusters. The candidate cluster heads are selected based on three measures, residual energy, and membership function. When candidate cluster heads have been selected, by considering maximum radio range, suitable cluster head for each individual node selected based on estimated connection time between node and corresponding cluster heads. If a node is going to leave its cluster in transmission phase, it selects the new cluster head based on estimated connection time. Simulation results show that our method outperforms LEACH-M, LEACH-ME and MBC in terms of data delivery rate and energy consumption.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Link prediction in social networks using hierarchical community detection 基于层次社区检测的社交网络链接预测
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288742
Hasti Akbari Deylami, M. Asadpour
{"title":"Link prediction in social networks using hierarchical community detection","authors":"Hasti Akbari Deylami, M. Asadpour","doi":"10.1109/IKT.2015.7288742","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288742","url":null,"abstract":"Social network analysis is an approach to the study of social structures. One of the important fields in social networks analyses is link prediction. Link prediction tries to reach an appropriate answer to this question: what kinds of interaction among members of a network would possible form in future, given a snapshot of the network in current time. The main purpose of this paper is to boost the performance of similarity based link prediction methods by using community information. This information is derived from the structure of the graph, based on the number of community levels that two vertices have in common, in a hierarchical representation of communities. To evaluate the performance of the proposed method, four datasets are used as benchmark. The results suggest that the information of communities often increases the efficiency and accuracy of link prediction.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Detecting communities in topical semantic networks 主题语义网络中的社区检测
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288762
A. Reihanian, B. Minaei-Bidgoli, H. Alizedeh
{"title":"Detecting communities in topical semantic networks","authors":"A. Reihanian, B. Minaei-Bidgoli, H. Alizedeh","doi":"10.1109/IKT.2015.7288762","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288762","url":null,"abstract":"With the advance of information technology, online communications between people have increased significantly. These kinds of communications have become more organized subsequent to the emergence of social networks. One of the most important issues in analyzing these kinds of networks is community detection, in which most studies detect communities through analyzing linkages of the networks. The desirable goal in this paper is to reach communities in which the members have the same topic of interest, and where the strength of connections between them is the consequence of their communications' content analysis. Therefore, we propose a new framework which considers the information that is shared by the users, and also the topics they are interested in, in order to find more meaningful communities. While similar studies have only found communities by merely considering the topological structure of the network, and some of the features of semantic information related to the users of the network, like their topics of interest, the proposed framework detects communities through considering topics, communications' content and topological structure of the network. Quantitative evaluations indicate that the proposed framework achieves promising results which are superior in comparison with the other relevant frameworks in the literature.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A hybrid method for Persian Named Entity Recognition 波斯语命名实体识别的混合方法
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288806
Farid Ahmadi, Hamed Moradi
{"title":"A hybrid method for Persian Named Entity Recognition","authors":"Farid Ahmadi, Hamed Moradi","doi":"10.1109/IKT.2015.7288806","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288806","url":null,"abstract":"Named Entity Recognition (NER) is an information extraction subtask that attempts to recognize and categorize named entities in unstructured text into predefined categories such as the names of people, organizations, and locations. Recently, machine learning approaches, such as Hidden Markov Model (HMM) as well as hybrid methods, are frequently used to solve Name Entity Recognition. Since the absence of publicly available data sets for NER in Persian, as our knowledge does not exist any machine learning base Persian NER system. Because of HMM innate weaknesses, in this paper, we have used both Hidden Markov Model and rule-based method to recognize named entities in Persian texts. The combination of rule-based method and machine learning method results in a high accurate recognition. The proposed system in is machine learning section uses from HMM and Viterbi algorithms; and in its rule-based section employs a set of lexical resources and pattern bases for the recognition of named entities including the names of people, locations and organizations. During this study, we annotate our own training and testing data sets to use in the related phases. Our hybrid approach performs on Persian language with 89.73% precision, 82.44% recall, and 85.93% F-measure using an annotated test corpus including 32,606 tokens.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Wireless network interconnect concept based on dielectric ring resonators 基于介电环形谐振器的无线网络互连概念
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288787
M. Mokhtari, Hamed Baghban
{"title":"Wireless network interconnect concept based on dielectric ring resonators","authors":"M. Mokhtari, Hamed Baghban","doi":"10.1109/IKT.2015.7288787","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288787","url":null,"abstract":"This paper reviews different optical interconnect architectures, one of the leading technologies, which is poised to revolutionize the computing technology with its low loss and notable high bandwidth. We focus on ring resonator based structures and discuss the improvements of different proposed interconnects in the key aspects like power loss. We propose adopting these architectures to design WLAN components. The operation of a 2×2 micro-ring resonator based optical switch is simulated at the wavelength of 1.98 micrometer. The transmission response of a band pass filter for 2.4 GHz frequency range is presented. The architecture of a 2×2 switch for this frequency range is adopted from optical domain, which has the potential of being the basic building block for WLAN devices and can be generalized to microwave interconnects. The transition loss of both optical and RF components are considered.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123890316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A payment recommender model to increase mutual trust between sellers and buyers in e-marketplaces 一个支付推荐模型,增加电子市场中卖家和买家之间的相互信任
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288667
H. Abbasi, S. Alireza, Hashemi Golpayegani
{"title":"A payment recommender model to increase mutual trust between sellers and buyers in e-marketplaces","authors":"H. Abbasi, S. Alireza, Hashemi Golpayegani","doi":"10.1109/IKT.2015.7288667","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288667","url":null,"abstract":"Nowadays, with the great development of electronic commerce, there exist lots of online marketplaces, each of which presents a different payment method to their customers. However, the remarkable point is that although there are few websites which offer their customers after-delivery payment methods, there does not exist a website which presents dynamic payment methods to their customers according to their trust level. Therefore, a piece of research needs to be done on different payment methods and their relation with the trust level of the buyer and the seller. In this paper, not only is this relation covered, but also a computational model is examined that can calculate the trust level between the buyer and the seller by means of seller, buyer, and transaction parameters. Moreover, the model offers the best payment parameters that maximizes the trust level of the buyer and the seller. This way, the transaction becomes more probable to happen.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"14 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123215270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID 基于二次残数的移动RFID认证与隐私方案的改进
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288808
Y. Azimi, J. Bagherzadeh
{"title":"Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID","authors":"Y. Azimi, J. Bagherzadeh","doi":"10.1109/IKT.2015.7288808","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288808","url":null,"abstract":"The way of transmitting data untouched through radio-frequency of magnetic fields done through wireless, is called RFID (Radio-frequency identification). The purpose of this method is auto identification of objects through tags attached to them. RFID system is created to ease data transfer about objects. An economic transfer was one of early goals of RFID systems, and this useful technology has entered other sectors of industry as well. Yet main concern in RFID systems is security and privacy. So far many protocols have been proposed to authenticate tags and readers but most of them are vulnerable. In year 2013, R. Doss et al. presented a low-weight protocol based on quadratic residues which provides secure channels between tag-reader and reader-server. In this paper we show that this protocol is vulnerable to replay attack and reader impersonation, and an attacker can authenticate itself to server as a legal tag or legal reader. So in this paper an improvement of this protocol is presented that is resistant to these attacks. Moreover, the proposed method has high speed and performance to do modular operations, because of the use of Montgo mery method.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Particle swarm optimization with chaotic velocity clamping (CVC-PSO) 混沌速度夹持(CVC-PSO)粒子群优化
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288811
Mohammad Hoseein Mojarrad, P. Ayubi
{"title":"Particle swarm optimization with chaotic velocity clamping (CVC-PSO)","authors":"Mohammad Hoseein Mojarrad, P. Ayubi","doi":"10.1109/IKT.2015.7288811","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288811","url":null,"abstract":"This article proposes a novel approach in particle swarm optimization (PSO) that combines chaos and velocity clamping with the aim of eliminating its known disadvantage that enforces particles to continue searching in search space boundaries. This problem reduces the performance of algorithm in obtaining the global optimum. This heuristic approach is called PSO with chaotic velocity clamping (CVC-PSO). Chaos is the study of non-linear dynamic systems which have extreme sensitivity to initial conditions called butterfly effect. In this paper, we use logistic equation to generate fully chaotic and randomness sequences in order to provide the global exploration possibility for particles which have left the search space because of having large velocity update. Finally, the experimentally obtained results of CVC-PSO and other algorithms, such as genetic algorithm (GA), standard PSO with inertia weight and improved imperialist competitive algorithm (CICA), are listed in different tables for comparison. The obtained results represent the success of CVC-PSO against other algorithms.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interactive tool to improve the automatic image annotation using MPEG-7 and multi-class SVM 利用MPEG-7和多类支持向量机改进图像自动标注的交互式工具
2015 7th Conference on Information and Knowledge Technology (IKT) Pub Date : 2015-05-26 DOI: 10.1109/IKT.2015.7288777
Jafar Majidpour, Edris Khezri, Hiwa Hassanzade, Kamal Smail Mohammed
{"title":"Interactive tool to improve the automatic image annotation using MPEG-7 and multi-class SVM","authors":"Jafar Majidpour, Edris Khezri, Hiwa Hassanzade, Kamal Smail Mohammed","doi":"10.1109/IKT.2015.7288777","DOIUrl":"https://doi.org/10.1109/IKT.2015.7288777","url":null,"abstract":"Automatic Image Annotation is a technique or a tool to retrieve content-based and semantic concepts images [1]. In technique, the image content is attached to a set of predefined switches. Content-Based Image Retrieval (CBIR) allows the users to retrieve the images efficiently. The image features are automatically extractable using image processing techniques. In this study, we proposed automatic image annotation using standardized color and texture called MPEG-7. These features include Color Layout Descriptor (CLD) and Scalable Color Descriptor (SCD) for colors and Edge Histogram Descriptor (EHD) for image texture. Moreover, to decrease the scope of color layout descriptor, we used Principal Components Analysis (PCA) and for classification we used Support Vector Machine (SVM). For an input search image, the above mentioned features are extracted and classification by Support Vector Machine and prepared to perform the image annotation. This system also presents the results of the comparison between different features from the MPEG-7 descriptors. The automatic image annotation which is presented in this study is related to TUDarmstadt images. The results confirm that the system is a reliable system which has both short vector length (maximum 400 elements for each image) and high precision of 90 percent.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信