2016 7th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
ConSec: An encryption policy for context aware security applications ConSec:用于上下文感知安全应用程序的加密策略
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476093
A. Haque, Shantanu Kode, A. Razaque, Muder Almiani
{"title":"ConSec: An encryption policy for context aware security applications","authors":"A. Haque, Shantanu Kode, A. Razaque, Muder Almiani","doi":"10.1109/IACS.2016.7476093","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476093","url":null,"abstract":"Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, \"ConSec\", which encrypts and decrypts the memory according the users' usage.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"145 1","pages":"96-101"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86212477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cluster subdivision towards power savings for randomly deployed WSNs — An analysis using 2-D spatial poisson process 随机部署wsn的聚类细分——基于二维空间泊松过程的分析
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476103
Dajin Wang
{"title":"Cluster subdivision towards power savings for randomly deployed WSNs — An analysis using 2-D spatial poisson process","authors":"Dajin Wang","doi":"10.1109/IACS.2016.7476103","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476103","url":null,"abstract":"We propose to use a 2-dimensional (2-D for short) spatial Poisson process to model a WSN with randomly deployed sensors, and use the model to analyze a scheme that subdivides the clusters of a WSN to achieve an overall power savings. We assume no knowledge of how the sensors are spread in the sensing area, and hence need a statistical process to describe the distribution of all sensors. Assuming the 2-D spatial Poisson distribution, a comprehensive analysis is performed to estimate the power savings brought about by the proposed subdivision. Using hexagon as the shape of the cluster, the analysis shows that the subdivision scheme can yield significant savings in overall power consumption of sensors in the cluster.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"39 1","pages":"156-161"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79415779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fletcher-Reeves learning approach for high order MQAM signal modulation recognition 高阶MQAM信号调制识别的Fletcher-Reeves学习方法
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476089
Mohammed Tag Elsir Awad Elsoufi, Xiong Ying, Wang Jun, Tang Bin
{"title":"Fletcher-Reeves learning approach for high order MQAM signal modulation recognition","authors":"Mohammed Tag Elsir Awad Elsoufi, Xiong Ying, Wang Jun, Tang Bin","doi":"10.1109/IACS.2016.7476089","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476089","url":null,"abstract":"A new method of Modulation Recognition of communication signals is proposed based on Clustering Validity Indices. These indices provide a good basis for key feature extraction. To distinguish different modulation schemes, a Fuzzy C-mean (FCM) clustering is used to get the membership matrix of different clusters. Then, a clustering validity measure is applied to extract features. To enhance clustering results at low SNR, a neural network with a conjugate gradient learning algorithm is utilized. Fletcher-Reeves learning approach enhances the recognition rate and widely improves the speed and rate of convergence. Simulation results show the validity of proposed approach compared with other approaches using only clustering or using back propagation neural networks. Misclassification rate is less for low order MQAM signals. This algorithm is applicable in high order MQAM signals. In Non-cooperative Communications, the modulated signal parameters are unknown. Some Modulation Recognition algorithms rely on estimating these parameters first, then applying recognition algorithms. Proposed algorithm doesn't need any prior information to achieve modulation recognition.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"74-79"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85936532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multiple multicast tree optimization solution based on software defined network 一种基于软件定义网络的多组播树优化方案
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476105
Meng Sun, Xinchang Zhang, Lu Wang, Huiling Shi, Wei Zhang
{"title":"A multiple multicast tree optimization solution based on software defined network","authors":"Meng Sun, Xinchang Zhang, Lu Wang, Huiling Shi, Wei Zhang","doi":"10.1109/IACS.2016.7476105","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476105","url":null,"abstract":"Multiple Multicast Tree (MMT) orchestration optimizes the share of network resources among coexisting MMT. The software defined networking (SDN) technique can conveniently monitor the network traffic and quickly install and change the routes. Based on the SDN environment, considering the dynamic change of the practical network traffic monitored by controller, we model the MMT optimization as a problem with the objective of minimizing the total path length subject to the constraints of bandwidth and MMT's Edge Modification Times (EMT). We propose a two-stage solution to solve the problem. In the first stage, we only consider the optimization objective and the bandwidth constraint to modify the initial MMT and obtain a suboptimal MMT. In the second stage, we continue to modify the suboptimal MMT according to the EMT obtained in the first stage. Experimental results demonstrate that our algorithm have the better performance in terms of the total path length and EMT compared with the existing algorithm of reconstructing a new MMT.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"168-173"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88050068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Arabian E-government websites accessibility: A case study 阿拉伯电子政务网站的可访问性:一个案例研究
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476064
Yahya M. Tashtoush, Ala Darabseh, Huda Al-Sarhan
{"title":"The Arabian E-government websites accessibility: A case study","authors":"Yahya M. Tashtoush, Ala Darabseh, Huda Al-Sarhan","doi":"10.1109/IACS.2016.7476064","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476064","url":null,"abstract":"Nowadays, most people are using the Internet to achieve their daily needs. One of these needs is the ability to access the government websites, to make the necessary transactions and procedures via the internet. Maintaining the transaction over the web arises the needs of building an available and accessible website for all users, even those with special needs. In this paper, we evaluate the accessibility for a set of Arabian E-government websites with two versions, English and Arabic, by using a set of automated tools. The results obtained from the two versions are compared to decide which is the best government website that achieved the least number of errors. The selected accessibility tools are supporting the Web Contents Accessibility Guidelines (WCAG) version 2.0 as an update of the previous version WCAG 1.0.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"16 1","pages":"276-281"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88521971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Implementation of parallel model checking for computer-based test security design 实现并行模型校核的计算机化考试安全设计
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476121
Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin bin Ahmadon, S. Yamaguchi, B. Gupta
{"title":"Implementation of parallel model checking for computer-based test security design","authors":"Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin bin Ahmadon, S. Yamaguchi, B. Gupta","doi":"10.1109/IACS.2016.7476121","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476121","url":null,"abstract":"Computer-based test (CBT for short) has become a new form of delivering test. This causes a challenge of unethical conduct during examinations such as cheating and accessing test data before the examination. Model checking is a promising approach to analyse the behavior and correctness of secured system. However, if a system has a large-scale behavior, we cannot apply model checking because of state space explosion. In this paper, we gave a security considerations of CBT and proposed a Petri net-based framework of parallel model checking with a Petri net splitting procedure. The proposed framework is useful to reduce the size of the net, thereby increases the applicability of model checking to security protocol verification. It allows us to analyse the property of each splitted nets simultaneously. We illustrated the proposed framework with a product called as E-monitoring with biometric authentication scheme as an application example.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"28 1","pages":"258-263"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74283791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transmission range adaption technique for non-uniform wireless sensor network topology extraction 非均匀无线传感器网络拓扑提取的传输距离自适应技术
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476104
Walaa Abd Ellatief, O. Younes, Hatem Ahmed, Mohee Hadhoud
{"title":"Transmission range adaption technique for non-uniform wireless sensor network topology extraction","authors":"Walaa Abd Ellatief, O. Younes, Hatem Ahmed, Mohee Hadhoud","doi":"10.1109/IACS.2016.7476104","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476104","url":null,"abstract":"Wireless sensor networks are characterized with large number of nodes deployed randomly over the network area. In many real applications, random deployment process produce non-uniform distribution of nodes. This means that there is no constant density over any unit area and therefore no constant number of neighbours for each node. With non-uniform distribution, network appear as if it divided to a set of sub-regions each with a different density level. Density in these sub-regions ranging from high density areas, medium, and others are empty areas. For this reason, topology extraction techniques is needed for sensors which helps to discover the layout of the network around them. It assists to figure the skeleton of the whole network. It can help in the discovery of holes and used to solve this problem as a guide for redeployment process to produce a full covered area. Our aim is to define a simple distributed technique that allow all sensors in the network to share information between them and extract the layout of the network. This is done by defining the closed boundary of sub-regions of different density levels which form the network. Previous techniques used for topology extraction need networks with very high density and deal with special deployment figures. Many of them requires uniform distribution which is not always applicable in real situations. Our proposed technique is simple, use lower density than other previously proposed techniques, and do not need special deployment figures.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"17 1","pages":"162-167"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83065505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong multilingual CAPTCHA based on handwritten characters 强大的基于手写字符的多语言验证码
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476118
M. H. Aldosari, Ahmad A. Al-Daraiseh
{"title":"Strong multilingual CAPTCHA based on handwritten characters","authors":"M. H. Aldosari, Ahmad A. Al-Daraiseh","doi":"10.1109/IACS.2016.7476118","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476118","url":null,"abstract":"CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a kind of test which is commonly used by different websites on the Internet to differentiate between humans and automated bots. Most websites require the user to pass the CAPTCHA before signing up or filling out most forms. CAPTCHA today is even used on some mobile applications to provide a higher security level that can protect websites and mobile applications against malicious attacks by automated bots and spammers. In this paper, we present an advanced CAPTCHA technique; our technique essentially relies on employing the human recognition ability, which is not available in automated bots or machines, through leveraging the handwriting characteristics in designing CAPTCHA. Moreover, the proposed CAPTCHA technique adopts handwritten characters of four different languages (English, Arabic, Spanish, and French) to generate handwritten multilingual CAPTCHA text using characters from the four adopted languages. Furthermore, the initial experiments' results have shown a promising security level that the proposed CAPTCHA technique can provide.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"239-245"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Arabic named entity disambiguation using linked open data 使用链接开放数据的阿拉伯命名实体消歧
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476074
Omar Al-Qawasmeh, Mohammad Al-Smadi, Nisreen Fraihat
{"title":"Arabic named entity disambiguation using linked open data","authors":"Omar Al-Qawasmeh, Mohammad Al-Smadi, Nisreen Fraihat","doi":"10.1109/IACS.2016.7476074","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476074","url":null,"abstract":"This research aims at tackling the problem of Arabic Named-Entity Disambiguation (ANED) through an enhanced approach of information extraction from Arabic Wikipedia and Linked Open Data (LOD). The approach uses query label expansion and text similarity techniques to disambiguate entities of the types: person, location, and organization. A reference dataset for ANED has been prepared and annotated with over 10K entity mentions. The reference dataset was used in evaluating the proposed ANED approach. Results show that the accuracy of ANED approach is 84% on the overall Dataset. Moreover, the proposed approach was capable to disambiguate location entities with accuracy of 94%, person entities with 76%, and organization entities with 78%.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"333-338"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84251915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An unsupervised method for face photo-sketch synthesis and recognition 一种人脸照片素描合成与识别的无监督方法
2016 7th International Conference on Information and Communication Systems (ICICS) Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476115
Heba Ghreeb M. Abdel-Aziz, H. M. Ebeid, M. Mostafa
{"title":"An unsupervised method for face photo-sketch synthesis and recognition","authors":"Heba Ghreeb M. Abdel-Aziz, H. M. Ebeid, M. Mostafa","doi":"10.1109/IACS.2016.7476115","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476115","url":null,"abstract":"Face recognition is considered one of the most essential applications of Biometrics for personal identification. Face sketch recognition is a special case of face recognition, and it is very important for forensic applications. In this paper, we propose an unsupervised method for face photo-sketch recognition by synthesizing a pseudo-sketch from a single photo. The proposed method is the first unsupervised method that deals with face sketch recognition. The proposed photo-sketch synthesis step consists of two main steps, namely: edge detection and hair detection, which are applied on the grayscale image of the photo image. In the recognition step, the artist sketch is compared with the generated pseudo-sketch. PCA and LDA are used to extract features from the sketch images. The k-nearest neighbor classifier with Euclidean distance is used in the classification step. We use the CUHK database to test the performance of the proposed Method. Results for the synthesized sketches are compared with state-of-the-art methods, e.g., Local Linear Embedding (LLE) and Eigen transformation. The experimental results show that the proposed method generates a clear synthesis sketch and it defines persons more accurate than other methods. Moreover, in the recognition step, the proposed method achieves a recognition rate at the 1-nearest neighbor (rank1: first-match) range from 82% with PCA to 94% with LDA. The highest recognition rate is obtained at the 5-nearest neighbor (rank 5) is 98% that is better than some of the state-of-the-art methods.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"221-226"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82151502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信