Merrihan B. Monir, M. H. AbdElaziz, Abdelaziz A. Abdelhamid, El-Sayed M. Ei-Horbaty
{"title":"Trust management in cloud computing: A survey","authors":"Merrihan B. Monir, M. H. AbdElaziz, Abdelaziz A. Abdelhamid, El-Sayed M. Ei-Horbaty","doi":"10.1109/INTELCIS.2015.7397227","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397227","url":null,"abstract":"Cloud computing is a new computing model that involves outsourcing of computer technologies due to the lack of their availability in certain locations. However, when there is no previous experience between cloud service providers and their consumers, consumers often hold a degree of uncertainty about the reliability, quality and performance of the services being offered. This paper presents a survey about the current trust management techniques regarding to the performance of cloud service providers taking into consideration other aspects like privacy, security, credibility, user feedback, etc.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"16 1","pages":"231-242"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82155591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code clone detection using coarse and fine-grained hybrid approaches","authors":"Abdullah M. Sheneamer, J. Kalita","doi":"10.1109/INTELCIS.2015.7397263","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397263","url":null,"abstract":"If two fragments of source code are identical to each other, they are called code clones. Code clones introduce difficulties in software maintenance and cause bug propagation. Coarse-grained clone detectors have higher precision than fine-grained, but fine-grained detectors have higher recall than coarse-grained. In this paper, we present a hybrid clone detection technique that first uses a coarse-grained technique to analyze clones effectively to improve precision. Subsequently, we use a fine-grained detector to obtain additional information about the clones and to improve recall. Our method detects Type-1 and Type-2 clones using hash values for blocks, and gapped code clones (Type-3) using block detection and subsequent comparison between them using Levenshtein distance and Cosine measures with varying thresholds.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"96 1","pages":"472-480"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88550403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bassiouni, W. Khalifa, EL-Sayed A. El Dahshan, Abdel-Badeeh M. Salam
{"title":"A study on PCG as a biometric approach","authors":"M. Bassiouni, W. Khalifa, EL-Sayed A. El Dahshan, Abdel-Badeeh M. Salam","doi":"10.1109/INTELCIS.2015.7397215","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397215","url":null,"abstract":"Phonocardiogram (PCG) is an emerging biometric modality that has seen about fifteen years of development. This paper provides a review of some of the most famous techniques that have been applied to the use of the PCG for biometric recognition. The paper also presents datasets used in PCG as well as the devices needed to capture them. PCG main modules are features extraction, reduction and classification schemes. The paper is concluded by a comparative analysis of the authentication performance of PCG biometric systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"55 1","pages":"161-166"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81413307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty
{"title":"An intelligent optimization approach for storage space allocation at seaports: A case study","authors":"Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty","doi":"10.1109/INTELCIS.2015.7397198","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397198","url":null,"abstract":"Storage space allocation problem at container terminals is NP-hard combinatorial optimization problem. This paper proposes a new approach based on genetic algorithm to optimize the solution for storage space allocation problem in container terminal at seaports. A new mathematical model is formulated to avoid bottlenecks in container yard operations, and to minimize vessels service time in port. Also, a simulation model using discrete event simulation tool is conducted to optimize the solution for storage space allocation problem is presented in this study. The proposed approach is applied on a real case study data of container terminal at Damietta port. The computational results show the effectiveness of the proposed approach.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"66-72"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75295620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Automatic Multi-label GrabCut using NPR for natural image segmentation","authors":"D. Khattab, H. M. Ebeid, M. Tolba, A. S. Hussein","doi":"10.1109/INTELCIS.2015.7397235","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397235","url":null,"abstract":"Automatic Multi-label GrabCut is an extension of the standard GrabCut technique to segment a given image automatically into its natural segments without any user intervention. The Normalized Probabilistic Rand (NPR) index is able to give meaningful comparisons by comparing different images and different segmentations of the same image. In this paper, more analysis is conducted to evaluate the efficiency of the developed automatic multi-label GrabCut using the NPR index. Based on using more than one human ground truth, segmentations are conducted on a large scale of the Berkeley's benchmark of natural images. The NPR, PR and GCE metrics produced acceptable accuracy measures emphasizing the scalability of the proposed technique for large scale datasets. Comparisons are applied for different images and experiments show that the NPR is the most efficient score to determine good segmentation compared to other metrics.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"14 1","pages":"288-292"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78807880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding the pin in the haystack: A Bot Traceback service for public clouds","authors":"E. Hossny, S. Khattab, F. Omara, H. Hassan","doi":"10.1109/INTELCIS.2015.7397230","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397230","url":null,"abstract":"Cloud computing permits customers to host their data and applications to the cloud with an interesting economic cost-benefit tradeoff. However, the low price of cloud computing resources encourages attackers to rent a bulk of their botnets on the cloud and launch their attacks from there, which makes customers worry about using cloud computing. Therefore, in this paper, we propose a Bot Traceback (BTB) service for reporting and tracing back the presence of a bot inside an IaaS cloud provider. BTB aims to identify the virtual machine on which a bot runs either inside the same provider or inside a federated provider. The BTB service has been implemented as a part of the security tools in the EASI-CLOUDS project and has been deployed online. We present the implementation details of the BTB service and its main components (the BTB reporting service and BTB detection service). The BTB detection service will start running after a BTB report is received either from the same provider or from another federated provider.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"3 1","pages":"258-262"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73612394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rayane El Sibai, Yousra Chabchoub, J. Demerjian, Zakia Kazi-Aoul, Kabalan Barbar
{"title":"A performance study of the chain sampling algorithm","authors":"Rayane El Sibai, Yousra Chabchoub, J. Demerjian, Zakia Kazi-Aoul, Kabalan Barbar","doi":"10.1109/INTELCIS.2015.7397265","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397265","url":null,"abstract":"On-line data stream analysis is an important challenge today because of the always-increasing rates of the streams issued from multiple heterogeneous sources, in many application domains. To reduce the amount of the data stream, several sampling methods were designed by the data stream research community. We focus in this paper, on the chain sampling algorithm proposed by Babcock et al. The aim of this algorithm is to select randomly and at any time, a given fixed proportion from the most recent items of the stream contained in the last sliding window. This algorithm is well adapted to the stream context, as only one pass over the data is performed. Moreover it uses a small memory, as it does not store all the items of the current sliding window. We show in this paper that the chain sampling algorithm suffers from some collision or redundancy problems. The collision occurs when the same item is selected as a sample more than once during the execution of the algorithm. We propose two approaches to overcome this weakness and improve the chain sampling algorithm. The first one is called “inverting the selection for a high sampling rate” and the second one is inspired from the “divide to conquer strategy”. Different experimentations are performed to show the efficiency of these two improvements, in particular their impact on the execution time of the algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"91 1","pages":"487-494"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78245454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber fuzzy assessment methods","authors":"M. Voskoglou","doi":"10.1109/INTELCIS.2015.7397189","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397189","url":null,"abstract":"The assessment of a system's performance is a very important task for its operation, because the results obtained by this action help the designer/user of the system to correct its weaknesses, thus making it more effective. The assessment methods usually utilized in practice are based on the principles of classical, bivalent logic (yes-no). However, in our everyday life they frequently appear assessment situations involving a degree of uncertainty and (or) ambiguity. Fuzzy logic, due to its nature of characterizing a case with multiple values, offers rich resources for dealing with such kind of situations. This gave us several times in past the impulse to apply principles of fuzzy logic for assessment purposes using as tools the corresponding system's total uncertainty (e.g. see [2] and its relevant references, Section of [3], etc) the Center of Gravity (COG) defuzzification technique (e.g. Section of [3], [4], etc) as well as the Triangular (TFAM) (e.g. [1]) and Trapezoidal (TRFAM) (e.g. [5]) Fuzzy Assessment Models, which are recently developed variations of the COG technique. In this presentation we shall use the Fuzzy Numbers (FNs), and in particular the Triangular (TFN) (e.g. [6]) and Trapezoidal (TpFN) Fuzzy Numbers, as an alternative assessment tool. FNs play a fundamental role in fuzzy mathematics, analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by an example, while this alternative assessment approach is compared with the assessment methods of the bivalent (calculation of the means, GPA index) and fuzzy logic (see above) that we have already used in earlier works.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"113 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79836326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online multi-person tracking-by-detection method using ACF and particle filter","authors":"T. Kokul, A. Ramanan, U. Pinidiyaarachchi","doi":"10.1109/INTELCIS.2015.7397272","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397272","url":null,"abstract":"Automatically detecting and tracking multiple persons in videos is one of the main research interest in computer vision based applications. This paper presents a tracking-by-detection approach for tracking people in dynamic backgrounds with frequent occlusions by combining pre-trained generic person detector, online trained person-specific detector and a motion tracker. The popular aggregate channel features (ACF) are used to train the detectors and target specific particle filter is used as motion tracker. In order to learn right appearance of a target person, person-specific detector learns positive samples from prior frames which are detected by both generic person detector and person-specific detector. Data associations among the coincident detections of the detectors and tracker are used to update the person-specific detector and motion tracker. The person-specific detector searches the target person in a reduced region, which is defined by the associate motion tracker. A careful combination of detections of both detectors and tracker are used to locate the correct target person in the video sequence. Experiments have been carried out on Caltech pedestrian benchmark dataset. The proposed method shows better performance against state-of-the-art tracker while maintaining the tracking speed in real-time.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"55 1","pages":"529-536"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89008483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a novel EEG wave controlled security system","authors":"Pritham Gajakumar Shah, Krishna Chaithanya Vastare, Xu Huang, Ajithkumar Srikumar, Suraj Mademur Sreenivasa, Adarsh Puvvadi Ram Mohan Kumar, Karthik Rajashekhar Kodada","doi":"10.1109/INTELCIS.2015.7397207","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397207","url":null,"abstract":"The need for good security systems in banking, e-commerce and other applications is ever increasing. The proposed project makes the security system more robust and less prone to attacks. Brain Computer Interface (BCI) is used in order to obtain the password from the user by using their brain waves. This paper describes the current trend in BCI technologies and then the Hardware implementation of the proposed solution has been described. The Electro-Encephalogram (EEG) waves are obtained with the help of active dry electrodes and processed using signal conditioning circuits. These EEG signals are then interpreted to obtain the thought pattern of the user to match them to the stored password in the system. Finally a Transmitter-Receiver model has been used with a lock interface system is used to indicate the opening or closing of the lock.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"37 1","pages":"116-120"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88550219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}