Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035954
Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi
The subject of identification edge in images has a wide application in various fields for that it's considered one of the important topics in a digital image processing. There are many algorithms to detect the edge in images, but the performance of these algorithms depends on the type of image, the environment of the image and the threshold value of the edge algorithm. The objective of this paper is to evaluate five algorithms of edge detection which are Roberts, Sobel, Prewitt, LOG, and Canny in multi environments clean and noisy by using several types of original images (binary image, graphic image, high frequency image, low frequency image, median frequency image, and texture image) and then determine the best algorithm. In noisy environment the following noises was used Gaussian, salt and pepper and speckle. It's known that each edge detection algorithm has a threshold value, if the current pixel value is less than the defined threshold in strength, it will be considered an edge pixel. The change rate of the threshold value in all environments is also explained through this study.
{"title":"Measurement of edge detection algorithms in clean and noisy environment","authors":"Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi","doi":"10.1109/ICAICT.2014.7035954","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035954","url":null,"abstract":"The subject of identification edge in images has a wide application in various fields for that it's considered one of the important topics in a digital image processing. There are many algorithms to detect the edge in images, but the performance of these algorithms depends on the type of image, the environment of the image and the threshold value of the edge algorithm. The objective of this paper is to evaluate five algorithms of edge detection which are Roberts, Sobel, Prewitt, LOG, and Canny in multi environments clean and noisy by using several types of original images (binary image, graphic image, high frequency image, low frequency image, median frequency image, and texture image) and then determine the best algorithm. In noisy environment the following noises was used Gaussian, salt and pepper and speckle. It's known that each edge detection algorithm has a threshold value, if the current pixel value is less than the defined threshold in strength, it will be considered an edge pixel. The change rate of the threshold value in all environments is also explained through this study.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035908
R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva
The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.
{"title":"Software implementation of the nonpositional cryptography algorithms","authors":"R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva","doi":"10.1109/ICAICT.2014.7035908","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035908","url":null,"abstract":"The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035955
S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov
The aim of the project is creation of methods increasing software reliability and fault tolerance in the cloud based systems. The aim to deliver a comprehensive framework for a substantial, cost-effective improvement in the dependability of application software run in the cloud, beyond the levels offered currently and in the foreseeable future by off-the-shelf (OTS) software products. This improvement will be achieved by using diverse redundancy in an innovative dynamic architecture.
{"title":"Application of diversity method for reliability of cloud computing","authors":"S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035955","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035955","url":null,"abstract":"The aim of the project is creation of methods increasing software reliability and fault tolerance in the cloud based systems. The aim to deliver a comprehensive framework for a substantial, cost-effective improvement in the dependability of application software run in the cloud, beyond the levels offered currently and in the foreseeable future by off-the-shelf (OTS) software products. This improvement will be achieved by using diverse redundancy in an innovative dynamic architecture.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035910
Adem Tekerek, Cemal Gemci, O. F. Bay
Firewall and intrusion detection systems are used by the purposes of preventing information loss and weakness on internet and providing security for web applications. However attacks to web applications do not only come from network layer. Web applications use Hyper Text Transfer Protocol (HTTP) and attacks come from this protocol to web pages. Tools used for providing security on network layer become inefficient for HTTP attacks. These attacks to web applications can be prevented by detection of HTTP. In this study, a hybrid web application firewall is developed by using proposed signature based detection and anomaly detection methods, to prevent attacks by detection of HTTP requests.
{"title":"Development of a hybrid web application firewall to prevent web based attacks","authors":"Adem Tekerek, Cemal Gemci, O. F. Bay","doi":"10.1109/ICAICT.2014.7035910","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035910","url":null,"abstract":"Firewall and intrusion detection systems are used by the purposes of preventing information loss and weakness on internet and providing security for web applications. However attacks to web applications do not only come from network layer. Web applications use Hyper Text Transfer Protocol (HTTP) and attacks come from this protocol to web pages. Tools used for providing security on network layer become inefficient for HTTP attacks. These attacks to web applications can be prevented by detection of HTTP. In this study, a hybrid web application firewall is developed by using proposed signature based detection and anomaly detection methods, to prevent attacks by detection of HTTP requests.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036010
J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová
The authors of this paper present their findings at the level of quantitative statistical analyses within wider international monitoring, in which one of the objectives was to determine the extent to which students of the economic and managerial profiling at ISCED level 5 considered their study points of selected educational topics interesting, which also form part of their educational portfolio from the field of informatics. Students rated to what extent is the topic of teaching relevant for education in the context of those study disciplines, respectively they evaluated through a scale in what extent is the educational content filled from their personal point of view with regard to education in the disciplines studied.
{"title":"Evaluation of education in the field of database systems and technologies within the study programs of economic and managerial focus","authors":"J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová","doi":"10.1109/ICAICT.2014.7036010","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036010","url":null,"abstract":"The authors of this paper present their findings at the level of quantitative statistical analyses within wider international monitoring, in which one of the objectives was to determine the extent to which students of the economic and managerial profiling at ISCED level 5 considered their study points of selected educational topics interesting, which also form part of their educational portfolio from the field of informatics. Students rated to what extent is the topic of teaching relevant for education in the context of those study disciplines, respectively they evaluated through a scale in what extent is the educational content filled from their personal point of view with regard to education in the disciplines studied.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035961
M. Gabbasov
Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes that processes such as data processing and data visualization on TOFI.
{"title":"TOFI technology capabilities for data processing and visualization","authors":"M. Gabbasov","doi":"10.1109/ICAICT.2014.7035961","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035961","url":null,"abstract":"Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes that processes such as data processing and data visualization on TOFI.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114376876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035975
Yusuf Acar, H. Dogan, E. Panayirci
This paper is concerned with the challenging and timely problem of channel estimation for spatial modulated systems in the presence of time varying channels. Recently, estimation of channel state information for SM systems is investigated by the recursive least square (RLS) algorithm for slow fading channels. However, it is clear that the RLS based receiver will have a performance degradation for fast fading channels. Therefore, we developed iterative channel estimation based on detected symbols and curve fitting to track the channel variations for SM systems. Simulation results have demonstrated that the proposed iterative channel estimation offer substantial performance gains over the RLS channel estimation. In particular, a savings of about 4dB is obtained at BER = 10-7, as compared with RLS based receiver at 150km/h for 2 × 4 single carrier SM systems.
{"title":"Channel estimation for SM systems over time-varying Rayleigh fading channels","authors":"Yusuf Acar, H. Dogan, E. Panayirci","doi":"10.1109/ICAICT.2014.7035975","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035975","url":null,"abstract":"This paper is concerned with the challenging and timely problem of channel estimation for spatial modulated systems in the presence of time varying channels. Recently, estimation of channel state information for SM systems is investigated by the recursive least square (RLS) algorithm for slow fading channels. However, it is clear that the RLS based receiver will have a performance degradation for fast fading channels. Therefore, we developed iterative channel estimation based on detected symbols and curve fitting to track the channel variations for SM systems. Simulation results have demonstrated that the proposed iterative channel estimation offer substantial performance gains over the RLS channel estimation. In particular, a savings of about 4dB is obtained at BER = 10-7, as compared with RLS based receiver at 150km/h for 2 × 4 single carrier SM systems.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035997
I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva
An approach to the software system development dedicated to the interactive learning of sign language is proposed. A basic architecture of the system, its modules, format and transmission protocol of the data are created. The article also describes the main module of the system responsible for the synthesis and the animation of the gestures and facial expressions of the emotions based on the three-dimensional pattern of a human body. It describes main requirements for the module, analyzing basic problems and the implementations for their solution, architecture and components, especially the ones that are responsible for the generation of the animation, its structure, the algorithm of gestures' combination and their graphical processing.
{"title":"System for sign language modeling and learning","authors":"I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva","doi":"10.1109/ICAICT.2014.7035997","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035997","url":null,"abstract":"An approach to the software system development dedicated to the interactive learning of sign language is proposed. A basic architecture of the system, its modules, format and transmission protocol of the data are created. The article also describes the main module of the system responsible for the synthesis and the animation of the gestures and facial expressions of the emotions based on the three-dimensional pattern of a human body. It describes main requirements for the module, analyzing basic problems and the implementations for their solution, architecture and components, especially the ones that are responsible for the generation of the animation, its structure, the algorithm of gestures' combination and their graphical processing.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035913
Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov
We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a "bad" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user-activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self-monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while having low system overhead.
{"title":"tBox: A system to protect a \"bad\" user from targeted and user-oriented attacks","authors":"Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035913","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035913","url":null,"abstract":"We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a \"bad\" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user-activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self-monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while having low system overhead.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035990
Ali Shahintash, Yashar Hajiyev
The employing of ICT applications into operational structure of public administrating is rapidly transforming societal interactions and the relationships among citizens, businesses, and state bodies. To strengthen the controllability and to expand of Internet-based services and processes it is necessary to establish more than just a developed interactive website that provides the right content and most demanded online services to citizen. There is strong demand among citizens for instant access to open public information, for high standards of improved services in a secure fashion. Behind every reliable and efficient application lie the critical elements as extensive infrastructure of digital networks, Internet and application servers, databases and support services. In paper the broad framework of measures that ensure protection of security of e-Government services. The focus of this paper is on results of exploration of two main issues vulnerability and security in e-government.
{"title":"e-Government services vulnerability","authors":"Ali Shahintash, Yashar Hajiyev","doi":"10.1109/ICAICT.2014.7035990","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035990","url":null,"abstract":"The employing of ICT applications into operational structure of public administrating is rapidly transforming societal interactions and the relationships among citizens, businesses, and state bodies. To strengthen the controllability and to expand of Internet-based services and processes it is necessary to establish more than just a developed interactive website that provides the right content and most demanded online services to citizen. There is strong demand among citizens for instant access to open public information, for high standards of improved services in a secure fashion. Behind every reliable and efficient application lie the critical elements as extensive infrastructure of digital networks, Internet and application servers, databases and support services. In paper the broad framework of measures that ensure protection of security of e-Government services. The focus of this paper is on results of exploration of two main issues vulnerability and security in e-government.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}