2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)最新文献

筛选
英文 中文
ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks ModConTR:一种模块化和可配置的基于信任和声誉的系统,用于自组织网络中的安全路由
George Hatzivasilis, I. Papaefstathiou, C. Manifavas
{"title":"ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks","authors":"George Hatzivasilis, I. Papaefstathiou, C. Manifavas","doi":"10.1109/AICCSA.2014.7073179","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073179","url":null,"abstract":"Distributed wireless networks have become popular due to the evolution of the Internet-of-Things. These networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes on the basis of network connectivity and a set of conventions that is determined by the routing protocol. Still, these protocols fail to protect legitimate nodes against several types of selfish and malicious activity. Thus, trust and reputation schemes are integrated with pure routing protocols to provide secure routing functionality. In this paper we propose ModConTR - a modular and adaptable trust and reputation-based system for secure routing. The system is composed of 11 different components which can be configured at runtime to adjust to each application's security and performance requirements. Presented work includes three possible configurations of ModConTR, considering ultra-lightweight, low-cost and lightweight implementations. Moreover, predefined configurations permit the implementation of the reasoning process for well-known secure routing protocols. Thus, we present a security and performance analysis for each of the components, including a comparative analysis of 10 complete trust and reputation schemes under identical attack scenarios. ModConTR is implemented using the NS2 simulator and is integrated with the DSR routing protocol.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127322386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems 自主云入侵防御系统在线风险评估与预测模型
H. Kholidy, A. Erradi, S. Abdelwahed, A. M. Yousof, H. A. Ali
{"title":"Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems","authors":"H. Kholidy, A. Erradi, S. Abdelwahed, A. M. Yousof, H. A. Ali","doi":"10.1109/AICCSA.2014.7073270","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073270","url":null,"abstract":"The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and secured. Intruders can exploit the large amount of cloud resources for their attacks. Most of the current security technologies do not provide the essential security features for cloud systems such as early warnings about future ongoing attacks, autonomic prevention actions, and risk measure. This paper discusses the integration of these three features to our Autonomic Cloud Intrusion Detection Framework (ACIDF). The early warnings are signaled through a new finite State Hidden Markov prediction model that captures the interaction between the attackers and cloud assets. The risk assessment model measures the potential impact of a threat on assets given its occurrence probability. The estimated risk of each security alert is updated dynamically as the alert is correlated to prior ones. This enables the adaptive risk metric to evaluate the cloud's overall security state. The prediction system raises early warnings about potential attacks to the autonomic component, controller. Thus, the controller can take proactive corrective actions before the attacks pose a serious security risk to the system. According to our experiments, both risk metric and prediction model have successfully signaled early warning alerts 39.6 minutes before the launching of the LLDDoS1.0 attack. This gives the system administrator or an autonomic controller ample time to take preventive measures.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Content-based image retrieval system using neural network 基于内容的神经网络图像检索系统
H. Karamti, M. Tmar, F. Gargouri
{"title":"Content-based image retrieval system using neural network","authors":"H. Karamti, M. Tmar, F. Gargouri","doi":"10.1109/AICCSA.2014.7073271","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073271","url":null,"abstract":"Visual information retrieval has become a major research area due to increasing rate at which images are generated in many application. This paper addresses an important problems related to the content-based images retrieval. It concerns the vector representation of images and its proper use in image retrieval. Indeed, we propose a new model of content-based image retrieval allowing to integrate theories of neural network on a vector space model, where each low level query can be transformed into a score vector. Preliminary results obtained show that our proposed model is effective in a comparative study on two dataset Corel and Caltech-UCSD.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124201952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Faculty performance evaluation system: An ontological approach 教师绩效评估系统:一种本体论方法
Samita Bai, Quratulain Rajput, Sharaf Hussain, S. Khoja
{"title":"Faculty performance evaluation system: An ontological approach","authors":"Samita Bai, Quratulain Rajput, Sharaf Hussain, S. Khoja","doi":"10.1109/AICCSA.2014.7073187","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073187","url":null,"abstract":"Performance evaluation of faculty members in a higher education is a serious challenge for management. Several qualitative and quantitative factors are considered leading to targeted professional growth of an organization to evaluate the performance, such as acquiring research grants, research profile, student evaluation, publications, academic responsibilities etc. However, to quantify such information is a difficult task. Usually standard “Key Performance Indicators” (KPIs) are used to evaluate bare level workload of a faculty, however gauging quality always remain a challenge. In this paper, we propose an ontology based faculty performance evaluation system where the ontology is used to conceptualize the qualitative factors of the faculty as well as the set of rules that together make a system. The Semantic Web Rule Language (SWRL) is used to represent rules in ontology and built-in reasoning support help to deduce new knowledge. The presented work has been tested by applying it on real data set of a Public Sector University in Pakistan, and analyzes the strengths and weaknesses of the proposed system. It must be mentioned that the use of ontology makes the system easily modifiable due to the availability of the sophisticated ontology editors and APIs as well as provides complete automatic system.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Business Process Management with mobile routes 业务流程管理与移动路由
C. Mahmoudi, F. Mourlin
{"title":"Business Process Management with mobile routes","authors":"C. Mahmoudi, F. Mourlin","doi":"10.1109/AICCSA.2014.7073229","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073229","url":null,"abstract":"Business processes are milestone of the information system of any companies. Their availability is a crucial aspect. We provide a solution for the high level of availability of business processes by the use of cluster of enterprise service buses (ESB). Our approach is based on the dynamic creation of the route between the business services and the migration of a runtime context from one ESB to another one. So, we insure the management of business processes over a cluster and measure the impact of such incident. Through the use of log, we also report these events which allow the administrator for preparing updates of the information system. With the use of open source software, we guarantee the reuse of our case study with other kinds of enterprise service bus, which respect open standard exchanges like XML language and REST API.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topical search engine for Internet of Things 物联网主题搜索引擎
Mosab Faqeeh, M. Al-Ayyoub, Mohammad Wardat, Ismail Hmeidi, Y. Jararweh
{"title":"Topical search engine for Internet of Things","authors":"Mosab Faqeeh, M. Al-Ayyoub, Mohammad Wardat, Ismail Hmeidi, Y. Jararweh","doi":"10.1109/AICCSA.2014.7073287","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073287","url":null,"abstract":"Internet of Things (IoT) has become a common buzzword nowadays in the Web. However, there is no search tool currently in place for discovering and learning about the different types of IoT elements. Hence, this paper presents a topical search engine for IoT. The motivation for a topical search engine comes from the relatively poor performance of general-purpose search engines, which depend on the results of generic Web crawlers. The topical search engine is a system that learns the specialization from examples, and then explores the Web, guided by a relevance and popularity rating mechanism. The results show that the proposed topical search engine outperforms other general search engines.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel design of Chaos based S-Boxes using genetic algorithm techniques 利用遗传算法技术设计一种基于混沌的s盒
R. Guesmi, M. B. Farah, A. Kachouri, M. Samet
{"title":"A novel design of Chaos based S-Boxes using genetic algorithm techniques","authors":"R. Guesmi, M. B. Farah, A. Kachouri, M. Samet","doi":"10.1109/AICCSA.2014.7073265","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073265","url":null,"abstract":"In this manuscript we present a novel method to design strong substitution Boxes based on chaos function and genetic algorithm techniques. Furthermore, we analyse the strength of the proposed S-Boxes. The proposed methodology is analyzed and tested for the following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution. Numerical simulation and security analysis demonstrate that the scheme is practical in image encryption.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Accelerating data mining with CUDA and OpenMP 使用CUDA和OpenMP加速数据挖掘
Adwa S. Al-Hamoudi, A. Biyabani
{"title":"Accelerating data mining with CUDA and OpenMP","authors":"Adwa S. Al-Hamoudi, A. Biyabani","doi":"10.1109/AICCSA.2014.7073244","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073244","url":null,"abstract":"The widespread availability of multi-core processors and specialized co-processors has generally not been matched by the actual use of parallel software by users. In this work we experimentally verify the simplicity of code parallelization by implementing two kinds of data mining algorithms on two parallel platforms with a view to building upon them in future projects. We use CUDA on a graphics card with 384 CUDA cores and OpenMP on a dual-core machine and record their performance versus the sequential base case with C++ code running on a single processor. We report modest speedups with OpenMP and significant speedups with CUDA as expected. We also observed underutilization of cores implying that results may be improved if the base code is further optimized.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
2D color shapes description by quaternion Disc-Harmonic moments 用四元数盘谐矩描述二维颜色形状
Nisrine Dad, Noureddine Ennahnahi, S. E. Ouatik, M. Oumsis
{"title":"2D color shapes description by quaternion Disc-Harmonic moments","authors":"Nisrine Dad, Noureddine Ennahnahi, S. E. Ouatik, M. Oumsis","doi":"10.1109/AICCSA.2014.7073208","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073208","url":null,"abstract":"Robustness to photometric transformations and invariance under geometric transformations are two crucial criteria that a shape descriptor must satisfy. In this direction, orthogonal moments have proved their performance since the image can be reconstructed from its descriptor. However, these conventional moments deal only with binary and gray-level images. Recently, the algebra of quaternions have been widely used in combination with these moments in order to describe color images. In this paper, we introduce the quaternion Disc- Harmonic moments (QDHMs) as an extension of the conventional Disc-Harmonic moments (DHMs) for describing 2D color shapes. The conventional DHMs were inspired by the spherical harmonics which use orthogonal basis functions and are known for their rotation-invariance property. Experiments on images extracted from the COIL-100 database were conducted in order to evaluate the performance of our descriptor. First, we have fixed some parameters that are the maximal order, the measure of similarity and the color space. Second, tests on photometric transformations robustness are provided. Finally, the discriminative power of the QDHMs based on recall-precision criterion is compared to the conventional disc-harmonic moments and the existing orthogonal quaternion-based moments.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"72 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed 一种新的WDM应用响应时间在WLAN和固定WiMAX网络中的应用
K. Nisar, Ibrahim A. Lawal, K. Abualsaud, T. El-Fouly
{"title":"A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed","authors":"K. Nisar, Ibrahim A. Lawal, K. Abualsaud, T. El-Fouly","doi":"10.1109/AICCSA.2014.7073280","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073280","url":null,"abstract":"Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small and medium sized enterprise sectors. Application Response Time is the key performance measure in WiMAX and WLAN Network Quality of Service (QoS). The WiMAX network does not provide sufficient QoS with respect to Application Response Time. Wavelength Division Multiplexing (WDM) has emerged as the promising technology to meet the ever-increasing demand for bandwidth In this paper, we developed a Distributed Client-Server Model to improve QoS with respect to Application Response Time in the Fixed WiMAX and WLAN Network in order to enhance the services that are provided to the end users. The new distributed Client-Server model was simulated in OPNET modeler 16.0 with multiple Base Stations (BSs), Subscribers Stations (SSs) and some Server BSs selected by the Nearest Neighborhood Algorithms using Orthogonal Frequency Division Multiplexing (OFDM) techniques and compared with the existing Centralized model using Frequency Division Multiplexing (FDM) techniques. The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信