7'th International Symposium on Telecommunications (IST'2014)最新文献

筛选
英文 中文
A cloud-based model for hospital information systems integration 基于云的医院信息系统集成模型
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000792
Sougand Setareh, Abuzar Rezaee, Vahid Farahmandian, Parvaneh Hajinazari, A. Asosheh
{"title":"A cloud-based model for hospital information systems integration","authors":"Sougand Setareh, Abuzar Rezaee, Vahid Farahmandian, Parvaneh Hajinazari, A. Asosheh","doi":"10.1109/ISTEL.2014.7000792","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000792","url":null,"abstract":"Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as you go and self-provisioning resources help healthcare organizations achieve their goals. This paper presents a cloud computing model for integration of hospital information systems which is based on service oriented architecture. Having considered the requirements of HIS integration, the proposed model enables convenient access for all system components including both service provider and organizational components. To ensure security and high level of availability required for medical information, a Backup and Recovery Cloud service is included in our model to provide the users with the ability to retrieve information in critical situations. In addition, a minimum level of local basic services is included in our model that makes possible retrieving information when the hospital faces network disconnection from the cloud. A scenario-based evaluation method is used for assessment of the proposed model which shows adopting cloud computing technology is an effective way for integrating health information systems.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127126458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Backward unlinkable and revocable secret handshake without random oracle 没有随机oracle的向后不可链接和可撤销的秘密握手
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000832
H. Yajam, J. Mohajeri, M. Salmasizadeh
{"title":"Backward unlinkable and revocable secret handshake without random oracle","authors":"H. Yajam, J. Mohajeri, M. Salmasizadeh","doi":"10.1109/ISTEL.2014.7000832","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000832","url":null,"abstract":"A Secret Handshake protocol provides a method of mutual authentication and key agreement which preserves users' anonymity, and prevents any information leakage to an unauthorized participant as well. Although in recent studies some schemes with desirable properties of “Unlinkability” and “Revocability” were proposed, in most of them unlinkability of revoked credentials or co-called “Backward Unlinkability” has been disregarded. Recently, Wen and Zhang proposed a backward unlinkable and revocable secret handshake scheme in random oracle model. They left it as an open problem whether such a secret handshake scheme without random oracle exists. In this paper, a new secret handshake protocol is proposed which satisfies these security requirements and also has impersonation resistance against malicious certificate authority. Subsequently, the security reduction proofs for backward unlinkability and impersonation resistance against malicious CA for the proposed scheme are provided.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and design of a multilayer plasmonic superlens by complex images technique 多层等离子体超透镜的复像分析与设计
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000685
M. Darvishzadeh-Varcheie, R. Faraji-Dana
{"title":"Analysis and design of a multilayer plasmonic superlens by complex images technique","authors":"M. Darvishzadeh-Varcheie, R. Faraji-Dana","doi":"10.1109/ISTEL.2014.7000685","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000685","url":null,"abstract":"A superlens is a slab of metal sandwiched between two dielectric layers. This structure can produce the image of an object in close vicinity without suffering from diffraction limit. Better resolution can be achieved by using a multilayer structure of metal and dielectric. In this paper, a new numerically accurate and efficient method is proposed to analyze a multilayer superlens structure. A Method of Moment (MoM) solution of the Magnetic Field Integral Equation (MFIE) formulation of the problem using Complex Images (CI) representation of the required Green's function is employed. First a single slab of silver as a superlens at 356nm and 633nm wavelengths will be analyzed, next a multilayer structure will be designed to overcome the diffraction limit of the single layer structure in the visible light frequency range.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid artificial neural network for preserving the oil reservoirs 一种用于油藏保护的混合人工神经网络
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000675
Mohsen Eslamnezhad, H. Akbaripour, M. Amin-Naseri
{"title":"A hybrid artificial neural network for preserving the oil reservoirs","authors":"Mohsen Eslamnezhad, H. Akbaripour, M. Amin-Naseri","doi":"10.1109/ISTEL.2014.7000675","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000675","url":null,"abstract":"In the preservation of oil reservoirs in upstream oil industries, complicated experiments, called PVT are done for the recognition of reservoir fluid properties. The existence of problems such as probable dangers, be in time consuming, and samples inaccuracy and limitations in temperature and pressure have fostered the use of intelligent methods in this field. In this study, in order to avoid the mentioned problems and finding the complex and nonlinear relationships between data and PVT experiments, Artificial Neural Network (ANN) has been used. In addition, as the suitable choice of the initial weights increases the Neural Network's efficiency, Genetic Algorithm (GA) is used in order to adjust the initial weights. For evaluating the proposed approach, the Iranian oil reservoir fluid properties are implemented. The results of research showed that the use of GA-based Artificial Neural Network, in contrast to the empirical correlations, predict the reservoir fluid properties in less time and with high accuracy. So, proposed Neural Network can be seen as a powerful approach for prediction of oil PVT properties.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SocialClymene: A negative reputation system for covert botnet detection in social networks SocialClymene:一个用于社交网络中隐蔽僵尸网络检测的负面声誉系统
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000840
Mansoureh Ghanadi, M. Abadi
{"title":"SocialClymene: A negative reputation system for covert botnet detection in social networks","authors":"Mansoureh Ghanadi, M. Abadi","doi":"10.1109/ISTEL.2014.7000840","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000840","url":null,"abstract":"Online social networks, or simply social networks, are one of the most popular services on the Internet, providing a platform for users to interact, communicate, and collaborate with others. With this in mind, they have been able to attract millions of active users. However, they are being increasingly threatened by so-called covert social network botnets, a new generation of botnets that exploit social networks to establish covert command and control channels. Stego-botnets are typical covert social network botnets that use images shared on a social network to send the botmaster's commands and receive the information stolen from infected users. In this paper, we present SocialClymene, a PageRank-based negative reputation system to detect stego-botnets. At the heart of SocialClymene lies a negative reputation subsystem that analyzes images shared by social network users and calculates a negative reputation score for every user based on the user's history of participation in suspicious group activities. More precisely, the negative reputation score of every user is calculated by the sum of its incoming normalized suspicious values weighted by the negative reputation scores of its neighbors in a suspicious group activity graph. Our experimental results have shown that SocialClymene can efficiently detect stego-botnets with a high detection rate and an acceptable low false alarm rate.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Microstrip frequency discriminators based on quarter-wave band-stop filters 基于四分之一波带阻滤波器的微带鉴频器
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000697
Samira Ebazadeh Choondaragh, N. Masoumi
{"title":"Microstrip frequency discriminators based on quarter-wave band-stop filters","authors":"Samira Ebazadeh Choondaragh, N. Masoumi","doi":"10.1109/ISTEL.2014.7000697","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000697","url":null,"abstract":"Microstrip frequency discriminators for a 5-bit instantaneous frequency measurement subsystem (IFMS) based on quarter-wavelength band-stop filters are presented in this paper. The rejection frequency is adjusted by the resonator length and its orientation, and the rejection bandwidth is tuned by the resonator distance from the main transmission line. In spite of the narrow stop bandwidth of a single resonator, an array of coupled resonators cause the wide stop bandwidth needed in discriminators. The proposed structure achieves compacts size and high stop-band rejection. Simulated results of the discriminators for the frequency range of 2-4GHz are presented. Frequency resolution of the presented discriminators is 62.5MHz.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application and effectiveness of ontology on e-Health 本体在电子医疗中的应用与有效性
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000764
M. Garshasbi, A. Asosheh, Hassan Asadi
{"title":"Application and effectiveness of ontology on e-Health","authors":"M. Garshasbi, A. Asosheh, Hassan Asadi","doi":"10.1109/ISTEL.2014.7000764","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000764","url":null,"abstract":"With the mutual understanding of the concepts and terms and the semantic relationship, Interaction and integration between health systems, decision support systems can be easily done. Ontology is one way of overcoming the problems of interoperability. Ontology is a formal explicit description of concepts in a special domain. In this article, to review the application and effectiveness of Ontologies in e-Health, and we provided a model for the design of disease ontology. By creating an ontology for the domain Diseases, Concepts and relationships in a variety of diseases and the semantic interoperability between them can be determined. By understanding the various aspects of the Ontology application in e-Health and overcoming their weaknesses and strengths, the impact of these tools can be used in the field. However, the use of valid models of Ontology Design Disease in order to manage data and representing knowledge, creating integrated systems and interaction and Knowledge-based decision support systems in the field of e-health is very important.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing energy efficiency in resource allocation for real-time cloud services 提高实时云服务资源配置的能源效率
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000793
Zahra Bagheri, K. Zamanifar
{"title":"Enhancing energy efficiency in resource allocation for real-time cloud services","authors":"Zahra Bagheri, K. Zamanifar","doi":"10.1109/ISTEL.2014.7000793","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000793","url":null,"abstract":"Improving energy efficiency is a multidimensional challenge regarding cloud computing environments management, which can directly reduce the operating costs and carbon dioxide emissions, while increasing the system reliability. An energy-efficient resource allocation approach for real-time cloud services is proposed in this paper. Several policies for provisioning of virtual machines (VMs) and hosts for the purpose of minimizing energy consumption and deadline miss rate are presented here. Resource allocation is optimized in order to increase the acceptance rate of real-time tasks through VM scaling and migration. This proposed algorithm significantly reduces energy consumption, and guarantees the timing constraints of tasks in an effective manner.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Speech emotion classification via a modified Gaussian Mixture Model approach 基于改进高斯混合模型的语音情感分类
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000752
Z. Hosseini, S. Ahadi, N. Faraji
{"title":"Speech emotion classification via a modified Gaussian Mixture Model approach","authors":"Z. Hosseini, S. Ahadi, N. Faraji","doi":"10.1109/ISTEL.2014.7000752","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000752","url":null,"abstract":"Emotional state of the speaker is an important feature embedded in his/her produced speech signal. Despite emotion recognition importance in system performance improvement, such as in ASR, not much research has been carried out in the speech emotion classification field. This paper is focused on finding more effective approaches to improve speaker emotional state classification methods. Two approaches are proposed for training and test phases while the Gaussian Mixture Model (GMM) is selected as the classifier. In these approaches, the motivation is to reduce the confusing information regions of emotional speech space and to increase salience of the discriminative regions. In the training phase, symmetric Kullback-Leibler Divergence (KLD) is used as a measure to detect the discriminative GMM mixtures while the confusing mixtures are ignored. This algorithm is known as KLD-GMM. In the test phase, the discriminative frames are recognized based on Frame Selection Decoding (FSD). This algorithm is known as FSD-GMM, when FSD algorithm is applied on KLD-GMM algorithm, the approach is named KLD-FSD-GMM algorithm. Two proposed algorithms have led to an average absolute improvement of about 7% in the emotion recognition performance in comparison with the baseline generalized GMM-based method.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Database intrusion detection system for detecting malicious behaviors in transaction and inter-transaction levels 数据库入侵检测系统用于检测事务级和事务间级的恶意行为
7'th International Symposium on Telecommunications (IST'2014) Pub Date : 2014-09-01 DOI: 10.1109/ISTEL.2014.7000815
M. Doroudian, H. Shahriari
{"title":"Database intrusion detection system for detecting malicious behaviors in transaction and inter-transaction levels","authors":"M. Doroudian, H. Shahriari","doi":"10.1109/ISTEL.2014.7000815","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000815","url":null,"abstract":"Database management systems containing the most valuable assets of enterprises, i.e., data. Ordinary intrusion detection systems usually deal with network or OS attacks and could not detect database specific attacks. Therefore, the existence of Intrusion Detection Systems in the database is a necessity. In this paper, we propose a type of intrusion detection system for detecting attacks in both database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find temporal patterns and rules. The advantage of this system compared to the previous database intrusion detection systems is that it can detect malicious behaviors in both transaction and inter-transaction levels using a hybrid approach, including specification-based detection and anomaly detection. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experimental evaluation results show high accuracy and effectiveness of the proposed system.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信