{"title":"The framework for efficient passphrase-based multifactor authentication in cloud computing","authors":"Faisal Rehman, Sanagoo Akram, M. A. Shah","doi":"10.1109/IConAC.2016.7604891","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604891","url":null,"abstract":"Cloud computing has quickly become one of the top innovations in the information technology world due to its benefits in terms of costs, flexibility, accessibility, availability, increased throughput and the ease of use. However, it faces major security issues and challenges that must be addressed and investigated. Due to its expansion on a very large scale, many potential users are facing threats of data protection and privacy. In this paper, we discuss the major authentication frameworks in cloud computing environment and provide analysis of different authentication models in cloud computing.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133961474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Zheng, Xin Zuo, Hualong Yu, Hongji Yang, Jifeng Shen
{"title":"Understanding software reengineering requirements for cloud-oriented service architecture","authors":"S. Zheng, Xin Zuo, Hualong Yu, Hongji Yang, Jifeng Shen","doi":"10.1109/IConAC.2016.7604893","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604893","url":null,"abstract":"In the emerging cloud computing and services computing era, technology advancements enable the sharing of unlimited resources, the usage of services without ownership, and composition of services on demand. Besides these desired features of IT services provisioning, system reliability, data security, user's privacy are also highly concerned on the cloud. This paper aims to analyse the reengineering requirements of general cloud computing users, and the strategic implications of the current delivery models and deployment models. We adopt the modelling notation of the i* framework and the general cost-benefit analysis annotations, to form an approach that is generally applicable to understand a possible computing paradigms shift. The approach also lays out how different users can make strategic decisions for cloud architecture based on the concrete context. An example software application is used to illustrate the proposed approach.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of BPNN based on improved PSO in main steam temperature control of supercritical unit","authors":"Yuzhen Sun, Jiang Gao, H. Zhang, D. Peng, Liqin","doi":"10.1109/IConAC.2016.7604916","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604916","url":null,"abstract":"In a supercritical power plant, large inertia, large delay and non-linear are the big challenges for main steam temperature control. An intelligent PID cascade control system with a BP Neural Network (BPNN) is proposed in this paper to solve this issue, which is based on the algorithm of improved Particle Swarm Optimization(PSO). In this system, the parameters of PID controller are adjusted online by BPNN, whose initial weight value is optimized by PSO algorithm, meanwhile the PSO method is also improved by Simulated Annealing (SA) algorithm which can get rid of local extreme point, accelerate the convergence speed and improve precision. Simulation result shows that the control quality and robustness of the system is significantly improved comparing with the conventional PID cascade control system.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical analysis of the eigenfilter method for the design of FIR filters and wideband beamformers","authors":"Ahsan Raza, W. Liu","doi":"10.1109/IConAC.2016.7604970","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604970","url":null,"abstract":"The least squares based eigenfilter method has been applied to the design of both finite impulse response (FIR) filters and wideband beamformers successfully. It involves calculating the resultant filter coefficients as the eigenvector of an appropriate Hermitian matrix, and offers lower complexity and less computation time with better numerical stability as compared to the standard least squares method. In this paper, we revisit the method and critically analyze the eigenfilter approach by revealing a serious performance issue in the passband of the designed FIR filter and the mainlobe of the wideband beamformer, which occurs due to a formulation problem. A solution is then proposed to mitigate this issue, and design examples for both FIR filters and wideband beamformers are provided to demonstrate the effectiveness of the proposed method.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133920157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. M. Liaqat, Mudassar Adeel Ahmed, F. Azam, Bilal Mehboob
{"title":"A Majority Voting Goal Based technique for Requirement Prioritization","authors":"R. M. Liaqat, Mudassar Adeel Ahmed, F. Azam, Bilal Mehboob","doi":"10.1109/IConAC.2016.7604958","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604958","url":null,"abstract":"Requirement prioritization (RP) plays an important role in software development phases. There are many techniques which are used for RP. By using these techniques, at time, specific goals of developed system also required to be fine-tuned. Sometimes we have a deadlock situation in RP and it's necessary to select only those requirements which are relatively more appropriate to satisfy the specific goals. In this paper we are proposing a novel technique, namely: Majority Voting Goal Based (MVGB) technique for RP. The proposed technique manages the deadlock situation that may occur while satisfying the most appropriate stakeholders' requirements for achieving specific goals.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Off-line signature verification based on a new symbolic representation and dynamic time warping","authors":"Xinxin Yao, Hua-Liang Wei","doi":"10.1109/IConAC.2016.7604903","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604903","url":null,"abstract":"Handwritten signature verification is a classical technology. Which uses features extracted from signatures. The purpose of signature verification is to identify whether a testing signature image is the same as a template. In this study, a new off-line signature verification method based on symbolic representation and dynamic time warping is proposed. In the proposed symbolic representation, the distances between symbols are defined according to the average value of each segment rather than the distance calculated based on Gaussian distribution, which is used in traditional symbolic representations. The proposed dynamic time warping (DTW) method is used to detect the optimal path and an optimal verification result can then be obtained by comparing the fitting errors of all matching paths. To demonstrate the performance the proposed approach, the following experiment is carried out: firstly, a signature image was created by a person and this is used as the template. Secondly, a total of 100 signature images written by the same person were collected, and the false rejected rate (FRR) and false acceptance rate (FAR) are calculated using the proposed method. Thirdly, a total of 100 signature images written by 100 different people were collected, based on which the false acceptance rate is calculated. The experimental results show that the performance of the proposed method is very promising, and the FRR and FAR values for the two group tests are 3% and 2% respectively.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks","authors":"Muhammad Salman, Muhammad Asif Aziz, M. A. Shah","doi":"10.1109/IConAC.2016.7604972","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604972","url":null,"abstract":"Cognitive Radio (CR) has emerged as an intelligent technology to deal with spectrum scarcity. This research aims to simulate our already published research paper “DDH-MAC: A novel Dynamic De-Centralized Hybrid MAC protocol for Cognitive Radio Networks”. We have assessed the efficiency of the protocol by using a network simulation tool, OPNET 14.5 modeler. The simulation results were then compared with CREAM-MAC and F2-MAC protocols, and a comparative analysis have been evaluated and discussed. We show that the DDH-MAC protocol provides efficiency in time and energy which are the core objective features of CR Ad-hoc networks. Moreover, we also found that the delay of DDH-MAC could be reduced to much extent by increasing the DSSS data rate in physical characteristics.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfeng Huang, D. Mcglinchey, Yuanxin Luo, Yi Chen
{"title":"A computational intelligence based dislocation recognition during molecular dynamics simulation","authors":"Jianfeng Huang, D. Mcglinchey, Yuanxin Luo, Yi Chen","doi":"10.1109/IConAC.2016.7604923","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604923","url":null,"abstract":"Dislocation evolution in metal is the majority response of external stress or strain during the deformation. In this paper, a computational intelligence aided dislocation recognition algorithm which is integrated in a molecular dynamics simulation is proposed. This algorithm is inspired by genetic algorithm(GA) and follows the main GA process in which the initial population is the disperse nodes set and is under the select, crossover to evolve the new generation of nodes set. Finally, two examples of the dislocation recognition during fatigue simulation by using this algorithm is provided with good result when comparing with the traditional MD post process method.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on security threats of smartphones in Internet of Things","authors":"M. Khan, M. A. Shah","doi":"10.1109/IConAC.2016.7604979","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604979","url":null,"abstract":"Internet of Things (IoT) is an emerging concept which will interconnect billions of devices (such as smartphones, sensors and other networking devices), to communicate with each other. This interconnection of devices can be beneficial in many ways such as improving location based services and timely coordination. However, this also impose severe security concerns specially on smartphones which contains sensitive data. In this paper, we provide a comprehensive analysis of different security issues in smartphones which are integral part of IoT. We provide an easy and concise overview of different security threats. Our categorization helps in identifying specific security breach and applying relevant countermeasures.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Evidential Reasoning rules to identification of asthma control steps in children","authors":"Huaying Zhu, Jianbo Yang, Dongling Xu, Cong Xu","doi":"10.1109/IConAC.2016.7604960","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604960","url":null,"abstract":"The UK is one of these countries in Europe, which have the highest death rate from asthma, and the rules to identify asthma control steps are vague in the current official guideline of asthma management. In this research, diagnosis rules on asthma control steps are developed to supplement the current guideline and to assist patients to monitor and manage their asthma on daily basis. The main challenge of developing the rules is missing values. Although the data examined have prodigious volumes of records for patients, no one have all and different patients have different information recorded. The large proportion of missing values lead to comparatively limited powers of some techniques like Decision Tree Analysis, Logistic Regression, ANN, Bayes' Rule and SVM. This research explores the Evidential Reasoning (ER) rule to develop prognostic rules for asthma control steps. ER is prior-free probabilistic inference and has not been applied to disease diagnosing and monitoring. The results are represented as probability distributions on asthma control steps given any combination of evidence, even if some combinations are not recorded in the current database. In practice, it could help clinicians to identify asthma control steps of patients, prescribe corresponding treatments, and monitor the effectiveness of the treatment and the progress of patients in asthma control management.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122690485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}