Proceedings of the The International Conference on Engineering & MIS 2015最新文献

筛选
英文 中文
An Overview about the Polymorphic Worms Signatures 多态蠕虫签名概述
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833031
Raja A. Moftah, Abdelsalam M. Maatuk, Peter Plasmann, Shadi A. Aljawarneh
{"title":"An Overview about the Polymorphic Worms Signatures","authors":"Raja A. Moftah, Abdelsalam M. Maatuk, Peter Plasmann, Shadi A. Aljawarneh","doi":"10.1145/2832987.2833031","DOIUrl":"https://doi.org/10.1145/2832987.2833031","url":null,"abstract":"With the proliferation of the internet among casual users as well as businesses, the range and frequency of security threats have increased dramatically. One of these threats is a particular type of malware known as a polymorphic worm. This is a program that can mutate its appearance with each infection and spreads through the network via semantics-preserving code manipulation methods or self-encryption techniques. This paper describes the characteristics of polymorphic worms and then explains the most common forms of pattern based detection, such as Autograph.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125618818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Proposed Method to Recognize the Research Trends using Web-based Search Engines 一种基于网络搜索引擎的研究趋势识别方法
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833012
Mohammed R. Elkobaisi, Abdelsalam M. Maatuk, Shadi A. Aljawarneh
{"title":"A Proposed Method to Recognize the Research Trends using Web-based Search Engines","authors":"Mohammed R. Elkobaisi, Abdelsalam M. Maatuk, Shadi A. Aljawarneh","doi":"10.1145/2832987.2833012","DOIUrl":"https://doi.org/10.1145/2832987.2833012","url":null,"abstract":"This paper presents a novel approach to recognize research trends in a particular domain of research (i.e. Agent development) that is based on the number of data extracted from search engines. Several well-known mathematical and statistical theories have been used, from which a mathematical model has been derived to predict the agent development. The proposed solution attempts to convert the raw resulted number of documents found on the Internet (in PDF format) into useful information, and fit a curve representing the number of searched data of every year. A prototype has been designed, to search multi-keywords at the same time and collect the required data automatically to eliminate the useless data, before converting it into usable data.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115005585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Building a Context Image-Based Search Engine Using Multi Clustering Technique 利用多聚类技术构建基于上下文图像的搜索引擎
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833006
Hasan Rashaideh, Habes Alkhraisat, A. Ghazo
{"title":"Building a Context Image-Based Search Engine Using Multi Clustering Technique","authors":"Hasan Rashaideh, Habes Alkhraisat, A. Ghazo","doi":"10.1145/2832987.2833006","DOIUrl":"https://doi.org/10.1145/2832987.2833006","url":null,"abstract":"Content-Based Image Retrieval (CBIR) is a challenging task which retrieves the similar images from the large database. Most of the CBIR system uses the low-level features such as color, texture and shape which has not much detailed information about the images, in case of looking for images that contain the same object or same scene with different viewpoints to extract the features from the images. Allowing users to find images on the web similar to a particular query image is a crucial component of modern search engines. In this paper the Speeded Up Robust Feature is combined with the color feature to improve the retrieval accuracy of the search engine. In this paper, k-means clustering algorithm is used for clustering image features. However, it is computationally expensive and the quality of the resulting clusters heavily depends on the dimension of the data. This paper proposed a new approach to improve the accuracy of the cluster results from using a new novel algorithm called NCD to reduce the dimension of the image features in the dataset. Experiment results show that the proposed color feature is more accurate and efficient in retrieving images with user-interested color and image objects compared with the current algorithms. Speeded Up Robust Features (SURF) show its advantages in rotation, scale changes, image blur, affine transformations and illumination changes.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple solutions for a critical nonhomogeneous Kirchhoff type problem in R3: Critical nonhomogeneous Kirchhoff equations R3中临界非齐次Kirchhoff型问题的多重解:临界非齐次Kirchhoff方程
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833084
A. Matallah, S. Benmansour
{"title":"Multiple solutions for a critical nonhomogeneous Kirchhoff type problem in R3: Critical nonhomogeneous Kirchhoff equations","authors":"A. Matallah, S. Benmansour","doi":"10.1145/2832987.2833084","DOIUrl":"https://doi.org/10.1145/2832987.2833084","url":null,"abstract":"In this paper, we use variational methods to study the existence and multiplicity of solutions for a nonhomogeneous Kirchhoff equation involving the critical Sobolev exponent.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126140105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Ontologies from Text Corpora 从文本语料库构建本体
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833029
Ali Benafia, S. Mazouzi, S. Benafia
{"title":"Building Ontologies from Text Corpora","authors":"Ali Benafia, S. Mazouzi, S. Benafia","doi":"10.1145/2832987.2833029","DOIUrl":"https://doi.org/10.1145/2832987.2833029","url":null,"abstract":"This paper presents a novel approach of information extraction for building ontologies covering an extensive range of applications drawn from corpora. Our goal is to propose a method that is independent of domains and based on a distributional analysis of semantic units to bring out all the candidates informative elements (concepts, entities, semantic relations, named entities ...). This method is based on a pipeline of four main stages allowing to refine the extraction information from unstructured text in the form of a suite of decomposable representations (sentences in triplets, \"argumental structure\"...) until to get a consistent final ontology. We applied the pipeline defined in the context of a repeated sampling of 100 articles randomly drawn from text corpus (`Le Monde' with annual version `2013'). For the evaluation results of the trial implementation of our system, we have achieved a level of accuracy at which was up to 74%. We believe from the results obtained that our methodology is quite generic, and can be easily adapted to any new domain.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experience-Based Packet Scheduler 基于经验的包调度程序
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2832996
Mert Yağcıoğlu, O. Bayat
{"title":"Experience-Based Packet Scheduler","authors":"Mert Yağcıoğlu, O. Bayat","doi":"10.1145/2832987.2832996","DOIUrl":"https://doi.org/10.1145/2832987.2832996","url":null,"abstract":"The object of this research is to develop a system that provides fairness among users and at the same time that helps to maximize the data transmission of whole system by optimizing the base station packet planners which are used telecommunication systems. At this research, a packet scheduler is designed for the above mentioned purpose and that is called experience-based packet scheduler (EBPS). The aim of this scheduler is that creating packet planner which makes optimization for sending packets to the users by creating decision metric and it takes into account users' experiences within a certain time period of the previous time, the load situation of the base station that user is connected, the channel quality experienced by the user in real-time and user subscription class. All these data are collected and a decision metric is creating and users who experience bad service previously will be the priority of these packets. Finally, designed EBPS will compared with the schedulers that are used widely in telecommunications system; round Robin (RR), Proportional Fairness (PF) and Maximum DRC (MaxDRC).","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring is Success Factors of Adopting Cloud Computing from Enterprise Overview 从企业概况看,衡量是采用云计算的成功因素
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2832993
Omar Sabri
{"title":"Measuring is Success Factors of Adopting Cloud Computing from Enterprise Overview","authors":"Omar Sabri","doi":"10.1145/2832987.2832993","DOIUrl":"https://doi.org/10.1145/2832987.2832993","url":null,"abstract":"Cloud Computing is technological trend that enable sharing resources between users through Internet in an on-demand manner. The services of cloud computing reduces the costs of computing and communication which increases the interest to companies around the world. However, many organizations are finding greater obstacles for adoption to this new technology. In this paper we use DeLone and McLean successes model to assess some components that need to be considered by an organization when making the decision of adopting cloud computing. The organization will be able to identify its weakness and strength for each factor, and then build and prepare plan that can help them to make appropriate decision toward a successful adoption of Cloud Computing.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133501219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Experimental Investigation of Wavelets for ECG Signal Denoising 小波对心电信号去噪的实验研究
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833033
Khadoudja Ghanem
{"title":"An Experimental Investigation of Wavelets for ECG Signal Denoising","authors":"Khadoudja Ghanem","doi":"10.1145/2832987.2833033","DOIUrl":"https://doi.org/10.1145/2832987.2833033","url":null,"abstract":"The main aim of the presented paper is to explore all types of all wavelet families at all possible decomposition levels to find the best decomposition level as well as the best wavelet family to denoise an ECG signal from a specific type of noise which is the white Gaussian noise. The universal hard and soft thresholding of Donoho & Johnston is used to shrink extracted details. The MIT-BIH signal database is used to test our programs. The experiments revealed that the Most interesting wavelet level decomposition is level 5, and, Daubechie Family has proved its performance in denoising ECG signal when comparing the Signal to Noise Ratio (SNR) measure. These two findings are well confirmed by an expert in the domain.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Feature Vector Based Approach for Software Component Clustering and Reuse Using K-means 基于特征向量的k均值软件组件聚类与重用方法
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833080
C. Srinivas, C. V. Rao
{"title":"A Feature Vector Based Approach for Software Component Clustering and Reuse Using K-means","authors":"C. Srinivas, C. V. Rao","doi":"10.1145/2832987.2833080","DOIUrl":"https://doi.org/10.1145/2832987.2833080","url":null,"abstract":"Software component clustering is an unsupervised learning approach which is used to cluster the software components. These clusters may then be used to study, analyze, understand behavior of the software components. In this paper, we use the k-means clustering algorithm to cluster the software components. The main difference lies in the use of distance measure which is designed to find the similarity between the software components. We use the distance measure [12], to find the pair wise project distance matrix and apply the k-means algorithm on this distance matrix. The main idea is to use more than one distance measure, to explore consensus based technique, so as to cluster software components, instead of using only one measure to cluster the components. This approach may also be applied for software architecture recovery problem by using our distance measure.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Intrusion Detection Using Text Processing Techniques: A Recent Survey 基于文本处理技术的入侵检测研究进展
Proceedings of the The International Conference on Engineering & MIS 2015 Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833067
G. R. Kumar, N. Mangathayaru, G. Narasimha
{"title":"Intrusion Detection Using Text Processing Techniques: A Recent Survey","authors":"G. R. Kumar, N. Mangathayaru, G. Narasimha","doi":"10.1145/2832987.2833067","DOIUrl":"https://doi.org/10.1145/2832987.2833067","url":null,"abstract":"Intrusion Detection is one of the major threats for any organization of any size. The approach of intrusion detection using text processing has been one of the research interests among researchers working in the area of the network and information security. In this approach for intrusion detection, the system calls serve as the source for mining and predicting any chance of intrusion. When an application runs, there might be several system calls which are initiated in the background. These system calls form the basis and the deciding factor for intrusion detection. We perform an extensive survey on Intrusion detection using text mining techniques and validate the suitability of various kernel measures published in the literature. We finally come out with the research directions for intrusion detection which have not been discussed in detail in the literature. We hope this survey will be useful for researchers working in the direction of intrusion detection using text mining techniques.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信