Sougand Setareh, Abuzar Rezaee, Vahid Farahmandian, Parvaneh Hajinazari, A. Asosheh
{"title":"A cloud-based model for hospital information systems integration","authors":"Sougand Setareh, Abuzar Rezaee, Vahid Farahmandian, Parvaneh Hajinazari, A. Asosheh","doi":"10.1109/ISTEL.2014.7000792","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000792","url":null,"abstract":"Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as you go and self-provisioning resources help healthcare organizations achieve their goals. This paper presents a cloud computing model for integration of hospital information systems which is based on service oriented architecture. Having considered the requirements of HIS integration, the proposed model enables convenient access for all system components including both service provider and organizational components. To ensure security and high level of availability required for medical information, a Backup and Recovery Cloud service is included in our model to provide the users with the ability to retrieve information in critical situations. In addition, a minimum level of local basic services is included in our model that makes possible retrieving information when the hospital faces network disconnection from the cloud. A scenario-based evaluation method is used for assessment of the proposed model which shows adopting cloud computing technology is an effective way for integrating health information systems.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127126458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backward unlinkable and revocable secret handshake without random oracle","authors":"H. Yajam, J. Mohajeri, M. Salmasizadeh","doi":"10.1109/ISTEL.2014.7000832","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000832","url":null,"abstract":"A Secret Handshake protocol provides a method of mutual authentication and key agreement which preserves users' anonymity, and prevents any information leakage to an unauthorized participant as well. Although in recent studies some schemes with desirable properties of “Unlinkability” and “Revocability” were proposed, in most of them unlinkability of revoked credentials or co-called “Backward Unlinkability” has been disregarded. Recently, Wen and Zhang proposed a backward unlinkable and revocable secret handshake scheme in random oracle model. They left it as an open problem whether such a secret handshake scheme without random oracle exists. In this paper, a new secret handshake protocol is proposed which satisfies these security requirements and also has impersonation resistance against malicious certificate authority. Subsequently, the security reduction proofs for backward unlinkability and impersonation resistance against malicious CA for the proposed scheme are provided.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and design of a multilayer plasmonic superlens by complex images technique","authors":"M. Darvishzadeh-Varcheie, R. Faraji-Dana","doi":"10.1109/ISTEL.2014.7000685","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000685","url":null,"abstract":"A superlens is a slab of metal sandwiched between two dielectric layers. This structure can produce the image of an object in close vicinity without suffering from diffraction limit. Better resolution can be achieved by using a multilayer structure of metal and dielectric. In this paper, a new numerically accurate and efficient method is proposed to analyze a multilayer superlens structure. A Method of Moment (MoM) solution of the Magnetic Field Integral Equation (MFIE) formulation of the problem using Complex Images (CI) representation of the required Green's function is employed. First a single slab of silver as a superlens at 356nm and 633nm wavelengths will be analyzed, next a multilayer structure will be designed to overcome the diffraction limit of the single layer structure in the visible light frequency range.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid artificial neural network for preserving the oil reservoirs","authors":"Mohsen Eslamnezhad, H. Akbaripour, M. Amin-Naseri","doi":"10.1109/ISTEL.2014.7000675","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000675","url":null,"abstract":"In the preservation of oil reservoirs in upstream oil industries, complicated experiments, called PVT are done for the recognition of reservoir fluid properties. The existence of problems such as probable dangers, be in time consuming, and samples inaccuracy and limitations in temperature and pressure have fostered the use of intelligent methods in this field. In this study, in order to avoid the mentioned problems and finding the complex and nonlinear relationships between data and PVT experiments, Artificial Neural Network (ANN) has been used. In addition, as the suitable choice of the initial weights increases the Neural Network's efficiency, Genetic Algorithm (GA) is used in order to adjust the initial weights. For evaluating the proposed approach, the Iranian oil reservoir fluid properties are implemented. The results of research showed that the use of GA-based Artificial Neural Network, in contrast to the empirical correlations, predict the reservoir fluid properties in less time and with high accuracy. So, proposed Neural Network can be seen as a powerful approach for prediction of oil PVT properties.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SocialClymene: A negative reputation system for covert botnet detection in social networks","authors":"Mansoureh Ghanadi, M. Abadi","doi":"10.1109/ISTEL.2014.7000840","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000840","url":null,"abstract":"Online social networks, or simply social networks, are one of the most popular services on the Internet, providing a platform for users to interact, communicate, and collaborate with others. With this in mind, they have been able to attract millions of active users. However, they are being increasingly threatened by so-called covert social network botnets, a new generation of botnets that exploit social networks to establish covert command and control channels. Stego-botnets are typical covert social network botnets that use images shared on a social network to send the botmaster's commands and receive the information stolen from infected users. In this paper, we present SocialClymene, a PageRank-based negative reputation system to detect stego-botnets. At the heart of SocialClymene lies a negative reputation subsystem that analyzes images shared by social network users and calculates a negative reputation score for every user based on the user's history of participation in suspicious group activities. More precisely, the negative reputation score of every user is calculated by the sum of its incoming normalized suspicious values weighted by the negative reputation scores of its neighbors in a suspicious group activity graph. Our experimental results have shown that SocialClymene can efficiently detect stego-botnets with a high detection rate and an acceptable low false alarm rate.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microstrip frequency discriminators based on quarter-wave band-stop filters","authors":"Samira Ebazadeh Choondaragh, N. Masoumi","doi":"10.1109/ISTEL.2014.7000697","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000697","url":null,"abstract":"Microstrip frequency discriminators for a 5-bit instantaneous frequency measurement subsystem (IFMS) based on quarter-wavelength band-stop filters are presented in this paper. The rejection frequency is adjusted by the resonator length and its orientation, and the rejection bandwidth is tuned by the resonator distance from the main transmission line. In spite of the narrow stop bandwidth of a single resonator, an array of coupled resonators cause the wide stop bandwidth needed in discriminators. The proposed structure achieves compacts size and high stop-band rejection. Simulated results of the discriminators for the frequency range of 2-4GHz are presented. Frequency resolution of the presented discriminators is 62.5MHz.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application and effectiveness of ontology on e-Health","authors":"M. Garshasbi, A. Asosheh, Hassan Asadi","doi":"10.1109/ISTEL.2014.7000764","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000764","url":null,"abstract":"With the mutual understanding of the concepts and terms and the semantic relationship, Interaction and integration between health systems, decision support systems can be easily done. Ontology is one way of overcoming the problems of interoperability. Ontology is a formal explicit description of concepts in a special domain. In this article, to review the application and effectiveness of Ontologies in e-Health, and we provided a model for the design of disease ontology. By creating an ontology for the domain Diseases, Concepts and relationships in a variety of diseases and the semantic interoperability between them can be determined. By understanding the various aspects of the Ontology application in e-Health and overcoming their weaknesses and strengths, the impact of these tools can be used in the field. However, the use of valid models of Ontology Design Disease in order to manage data and representing knowledge, creating integrated systems and interaction and Knowledge-based decision support systems in the field of e-health is very important.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing energy efficiency in resource allocation for real-time cloud services","authors":"Zahra Bagheri, K. Zamanifar","doi":"10.1109/ISTEL.2014.7000793","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000793","url":null,"abstract":"Improving energy efficiency is a multidimensional challenge regarding cloud computing environments management, which can directly reduce the operating costs and carbon dioxide emissions, while increasing the system reliability. An energy-efficient resource allocation approach for real-time cloud services is proposed in this paper. Several policies for provisioning of virtual machines (VMs) and hosts for the purpose of minimizing energy consumption and deadline miss rate are presented here. Resource allocation is optimized in order to increase the acceptance rate of real-time tasks through VM scaling and migration. This proposed algorithm significantly reduces energy consumption, and guarantees the timing constraints of tasks in an effective manner.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech emotion classification via a modified Gaussian Mixture Model approach","authors":"Z. Hosseini, S. Ahadi, N. Faraji","doi":"10.1109/ISTEL.2014.7000752","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000752","url":null,"abstract":"Emotional state of the speaker is an important feature embedded in his/her produced speech signal. Despite emotion recognition importance in system performance improvement, such as in ASR, not much research has been carried out in the speech emotion classification field. This paper is focused on finding more effective approaches to improve speaker emotional state classification methods. Two approaches are proposed for training and test phases while the Gaussian Mixture Model (GMM) is selected as the classifier. In these approaches, the motivation is to reduce the confusing information regions of emotional speech space and to increase salience of the discriminative regions. In the training phase, symmetric Kullback-Leibler Divergence (KLD) is used as a measure to detect the discriminative GMM mixtures while the confusing mixtures are ignored. This algorithm is known as KLD-GMM. In the test phase, the discriminative frames are recognized based on Frame Selection Decoding (FSD). This algorithm is known as FSD-GMM, when FSD algorithm is applied on KLD-GMM algorithm, the approach is named KLD-FSD-GMM algorithm. Two proposed algorithms have led to an average absolute improvement of about 7% in the emotion recognition performance in comparison with the baseline generalized GMM-based method.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database intrusion detection system for detecting malicious behaviors in transaction and inter-transaction levels","authors":"M. Doroudian, H. Shahriari","doi":"10.1109/ISTEL.2014.7000815","DOIUrl":"https://doi.org/10.1109/ISTEL.2014.7000815","url":null,"abstract":"Database management systems containing the most valuable assets of enterprises, i.e., data. Ordinary intrusion detection systems usually deal with network or OS attacks and could not detect database specific attacks. Therefore, the existence of Intrusion Detection Systems in the database is a necessity. In this paper, we propose a type of intrusion detection system for detecting attacks in both database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find temporal patterns and rules. The advantage of this system compared to the previous database intrusion detection systems is that it can detect malicious behaviors in both transaction and inter-transaction levels using a hybrid approach, including specification-based detection and anomaly detection. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experimental evaluation results show high accuracy and effectiveness of the proposed system.","PeriodicalId":417179,"journal":{"name":"7'th International Symposium on Telecommunications (IST'2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}