2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

筛选
英文 中文
Hybrid Curvelet Transform and Least Significant Bit for image steganography 图像隐写的混合曲波变换和最小有效位
Heba Mostafa, A. Ali, Ghada El Taweal
{"title":"Hybrid Curvelet Transform and Least Significant Bit for image steganography","authors":"Heba Mostafa, A. Ali, Ghada El Taweal","doi":"10.1109/INTELCIS.2015.7397238","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397238","url":null,"abstract":"In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet curvelet transform before embedding the secret data by using LSB technique. Invoking the curvelet transform in the proposed method can handle the curve discontinuities in the cover image to obtain a better quality and robustness image. The LSB technique is applied on the obtained discrete curvelet coefficients image to embed the secret data without making noticeable changes to the cover image. The general performance of the proposed method is tested on 10 cover and secret images and compared against two benchmark methods. The experimental results show that the proposed method is a promising method and can obtain results better than the other compared methods.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"25 1","pages":"300-305"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86087442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A comparative study into swarm intelligence algorithms for dynamic tasks scheduling in cloud computing 云计算中动态任务调度的群智能算法比较研究
Gamal F. Elhady, Medhat A. Tawfeek
{"title":"A comparative study into swarm intelligence algorithms for dynamic tasks scheduling in cloud computing","authors":"Gamal F. Elhady, Medhat A. Tawfeek","doi":"10.1109/INTELCIS.2015.7397246","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397246","url":null,"abstract":"Cloud computing are becoming the major source of computing. The core idea of this environment is managing and scheduling the available resources to provide service's needs. Servers in cloud may be physical or virtual machines accessed across the network. Selecting machines for executing a task in the cloud computing must be considered. They have to be selected according to its status and submitted tasks properties to exploit the efficiency of the resources. Cloud task scheduling is considered an NP-hard optimization problem, and many meta-heuristic algorithms are suitable to solve it. This paper investigates three possible approaches proposed for dynamic task scheduling in cloud computing. The three approaches are belonging to the field of swarm intelligence that is used to find solutions for difficult or impossible combinatorial problems. These approaches are inspired by ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. The main goal is to provide an evaluation and comparative study of these approaches that are used to minimize the makespan of a given tasks set. Performance of the algorithms is simulated using toolkit package of CloudSim. Algorithms have been compared with each other and with the well-known existed algorithms for dynamic task scheduling problem. The results of the experiments are presented and the strengths of each algorithm are investigated. Experimental results show that the proposed approaches satisfy expectation, also proved that ABC algorithm is the superior than other algorithms.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"362-369"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91107366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Artificial immune system based intrusion detection 基于人工免疫系统的入侵检测
Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk
{"title":"Artificial immune system based intrusion detection","authors":"Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk","doi":"10.1109/INTELCIS.2015.7397274","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397274","url":null,"abstract":"Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several techniques have been applied to intrusion detection system such as artificial neural Network, genetic algorithms, artificial immune system. Most researchers suggested improving the intrusion detection performance and accuracy. In this paper, we used artificial immune system network based intrusion detection. In our framework we suggest using GureKddcup database set for intrusion detection and apply R-chunk algorithm of artificial immune system technique, it is used for anomaly detection .An optimized feature selection of rough set theory used for enhancing time consuming.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"39 1 1","pages":"542-546"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91035121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A proposed approach to detect and thwart previously unknown code injection attacks 提出了一种检测和阻止未知代码注入攻击的方法
Omar Hussein, Nermin Hamza, H. Hefny
{"title":"A proposed approach to detect and thwart previously unknown code injection attacks","authors":"Omar Hussein, Nermin Hamza, H. Hefny","doi":"10.1109/INTELCIS.2015.7397243","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397243","url":null,"abstract":"This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcessO system calls, otherwise child-process creation will fail. YSCM intercepts and verifies CreateProcessO system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, YSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries' attacks by preventing the operating system from loading and executing the new malicious child process. YSCM runs in a microkernel-based virtual machine in order to achieve two-fold advantages: (1) isolate security-critical information from probable adversaries' attacks; and (2) exploit security-related and performance-related advantages associated with thin virtual machine monitors. The expected effectiveness of YSCM is high since it is circumvention-proof, and precise in extracting the normal behavior of applications chosen to be monitored.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"15 6 1","pages":"336-342"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81046731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational complexity for some problems of two terms unification based on concatenation 基于串联的两项统一问题的计算复杂度
N. K. Kosovskii
{"title":"Computational complexity for some problems of two terms unification based on concatenation","authors":"N. K. Kosovskii","doi":"10.1109/INTELCIS.2015.7397196","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397196","url":null,"abstract":"Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"56-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79113582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated analysis for basketball free throw 篮球罚球自动分析
A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma
{"title":"Automated analysis for basketball free throw","authors":"A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma","doi":"10.1109/INTELCIS.2015.7397259","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397259","url":null,"abstract":"Kinetic analysis of the sport player performance is a very important operation for players and coaches, in order to fully understand player development and abilities. Commonly this operation is done by human observation and reviewing a large amount of recorded video. Problems with the traditional way are that this is time-consuming, inaccurate, mostly neither the players nor the coaches will be able to review the whole video content or part of the recorded video, and in some cases the reviewer may overlook some important details. This paper proposes a suggested computerized kinetic analysis for basketball free throw, the paper first detects the main positions of the free throw, then analyses the player performance based on the calculated Hu moment.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"22 12 1","pages":"447-453"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82918143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fuzzy assessment processes 模糊评价过程
M. Voskoglou
{"title":"Fuzzy assessment processes","authors":"M. Voskoglou","doi":"10.1109/INTELCIS.2015.7397233","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397233","url":null,"abstract":"In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as assessment tools. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by three examples, through which the effectiveness of our new fuzzy assessment approach is validated compared to already established in earlier author's works assessment methods of the classical logic (calculation of the means, GPA index) and of the fuzzy logic (Trapezoidal Model).","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"272-280"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88801322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partial deduction in predicate calculus as a tool for artificial intelligence problem complexity decreasing 部分演绎在谓词演算中作为人工智能问题复杂性降低的工具
T. Kosovskaya
{"title":"Partial deduction in predicate calculus as a tool for artificial intelligence problem complexity decreasing","authors":"T. Kosovskaya","doi":"10.1109/INTELCIS.2015.7397199","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397199","url":null,"abstract":"Many artificial intelligence problems are NP-complete ones. To decrease the needed time of such a problem solving a method of extraction of sub-formulas characterizing the common features of objects under consideration is suggested. This method is based on the offered by the author notion of partial deduction. Repeated application of this procedure allows to form a level description of an object and of classes of objects. A model example of such a level description and the degree of steps number increasing is presented in the paper.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"73-76"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems 协作系统集成安全与安保的知识在环方法
Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann
{"title":"A knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems","authors":"Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann","doi":"10.1109/INTELCIS.2015.7397237","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397237","url":null,"abstract":"A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"48 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76353186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building data warehouse system for the tourism sector 构建旅游行业数据仓库系统
T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam
{"title":"Building data warehouse system for the tourism sector","authors":"T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam","doi":"10.1109/INTELCIS.2015.7397253","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397253","url":null,"abstract":"Decision makers in the tourism sector face real challenges. There is no chance to access a unified data source that can supply information to meet their inquiries and expectations. In this paper, we propose a data warehouse system for supporting the decision makers in the Egyptian tourism sector. The methodology followed to build this system is descried in details to guide the other developing countries who are trying to support their decision makers in the tourism sector by building a similar data warehouse system. In addition, we evaluated the tourism data warehouse system. The results of evaluation indicated that it can meet the needs and requirements of the decision makers in the tourism sector.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"18 1","pages":"410-417"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74939881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信