首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Health Intelligence Model for Evaluation of Social Media Outcomes 社会媒体结果评估的健康智力模型
J. Woodside
Within healthcare there is an opportunity for social media to improve overall care. Despite the currently established capabilities, there is still much room for improvement and growth in healthcare social media as compared with traditional forms of social media. The development of a healthcare specific data model for modeling social media is required to appropriately measure outcomes and demonstrate the value of social media in healthcare. The management questions include how to setup a health intelligence data model in order to appropriately capture, organize, interpret, and analyze patient outcomes related to social media. This paper develops a data mode with, dimensional values and application for tracking social media outcomes to allow for advanced analysis and healthcare intelligence insights to applicable stakeholders.
在医疗保健领域,社交媒体有机会改善整体护理。尽管目前已经具备了一定的能力,但与传统形式的社交媒体相比,医疗保健社交媒体仍有很大的改进和增长空间。需要开发特定于医疗保健的数据模型,对社交媒体进行建模,以适当地衡量结果并展示社交媒体在医疗保健中的价值。管理问题包括如何建立健康智能数据模型,以便适当地捕获、组织、解释和分析与社交媒体相关的患者结果。本文开发了一个具有维度值和应用程序的数据模式,用于跟踪社交媒体结果,以便为适用的利益相关者提供高级分析和医疗保健情报见解。
{"title":"Health Intelligence Model for Evaluation of Social Media Outcomes","authors":"J. Woodside","doi":"10.1109/ITNG.2012.140","DOIUrl":"https://doi.org/10.1109/ITNG.2012.140","url":null,"abstract":"Within healthcare there is an opportunity for social media to improve overall care. Despite the currently established capabilities, there is still much room for improvement and growth in healthcare social media as compared with traditional forms of social media. The development of a healthcare specific data model for modeling social media is required to appropriately measure outcomes and demonstrate the value of social media in healthcare. The management questions include how to setup a health intelligence data model in order to appropriately capture, organize, interpret, and analyze patient outcomes related to social media. This paper develops a data mode with, dimensional values and application for tracking social media outcomes to allow for advanced analysis and healthcare intelligence insights to applicable stakeholders.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem 求解旅行商问题的多层图划分方案
Rana Atif Ali Khan, Muhammad Umair Khan, Muneeb Iqbal
Traveling salesman problem looks simple but it is an important combinatorial problem. This paper proposes a new hybrid scheme to find the shortest distance of tour in which each city is visited exactly one time, with the return back to the starting city. Traveling salesman problem is solved using multilevel graph partitioning approach. Although traveling salesman problem itself is a very difficult problem as it belongs to the NP-Complete problem class, yet one of the best possible solution is proposed using multilevel graph partitioning which also belongs to the NP-Complete problem class. To reduce the complexity, k-mean partitioning algorithm is used which divides the main problem into multiple partitions. Then solving each partition separately and thus finally improving the solution for overall tours by applying Lin Kernighan algorithm. From all of this analysis, an optimal solution is produced which tends to solve travelling salesman problem and could be used in more advance and complex applications.
旅行商问题看似简单,却是一个重要的组合问题。本文提出了一种新的混合方案,以求每个城市只游览一次,并返回起始城市的最短旅行距离。利用多层图划分方法求解旅行商问题。虽然旅行商问题本身是一个非常困难的问题,因为它属于np完全问题类,但提出了一个最好的解决方案,即使用多层图划分,也属于np完全问题类。为了降低复杂度,采用k-均值划分算法,将主要问题划分为多个分区。然后分别求解每个分区,最后应用Lin Kernighan算法改进整体游的解。通过这些分析,得出了一个趋向于解决旅行商问题的最优解,并可用于更高级、更复杂的应用。
{"title":"Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem","authors":"Rana Atif Ali Khan, Muhammad Umair Khan, Muneeb Iqbal","doi":"10.1109/ITNG.2012.106","DOIUrl":"https://doi.org/10.1109/ITNG.2012.106","url":null,"abstract":"Traveling salesman problem looks simple but it is an important combinatorial problem. This paper proposes a new hybrid scheme to find the shortest distance of tour in which each city is visited exactly one time, with the return back to the starting city. Traveling salesman problem is solved using multilevel graph partitioning approach. Although traveling salesman problem itself is a very difficult problem as it belongs to the NP-Complete problem class, yet one of the best possible solution is proposed using multilevel graph partitioning which also belongs to the NP-Complete problem class. To reduce the complexity, k-mean partitioning algorithm is used which divides the main problem into multiple partitions. Then solving each partition separately and thus finally improving the solution for overall tours by applying Lin Kernighan algorithm. From all of this analysis, an optimal solution is produced which tends to solve travelling salesman problem and could be used in more advance and complex applications.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
iBATD: A New Routing Metric for Multi-radio Wireless Mesh Networks iBATD:一种新的多无线电无线网状网络路由度量
Bing Qi, Fangyang Shen, Syed Raza
An easy and low-cost approach to address the limit capacity problem in wireless mesh networks that has recently been proposed is to install multiple wireless radios for a single wireless node. Operating the radios within each node on non-overlapping channels can utilize the radio spectrum more greedily and thereby reduces interference and contention. In such multi-radio wireless mesh networks, an effective routing metric should deal with channel diversity in order to make a wise routing path selection. In this paper, we propose a novel routing metric called iBATD (improved Bottleneck Aware Transmission Delay metric)for multi-radio wireless mesh networks. The fundamental idea relies on the observation that the channel with the maximum transmission delay(bottleneck) along one path has the most negative impact on the entire path performance. To accurately measure transmission delay for the bottleneck channel, the iBATD metric improves the BATD routing metric by considering the MAC overhead as well as the link loss rate discrepancy within one path. Our experimental results show that the new iBATD metric outperforms BATD in case of throughput and average latency.
最近提出的解决无线网状网络容量限制问题的一种简单且低成本的方法是为单个无线节点安装多个无线无线电。在非重叠信道上操作每个节点内的无线电可以更贪婪地利用无线电频谱,从而减少干扰和争用。在这种多无线电无线网状网络中,有效的路由度量应该能够处理信道分集,从而做出明智的路由路径选择。在本文中,我们提出了一种新的路由度量,称为iBATD(改进的瓶颈感知传输延迟度量),用于多无线电无线网状网络。其基本思想依赖于这样一种观察,即在一条路径上具有最大传输延迟(瓶颈)的信道对整个路径性能的负面影响最大。为了准确地测量瓶颈信道的传输延迟,iBATD度量通过考虑MAC开销和一条路径内的链路损失率差异来改进BATD路由度量。我们的实验结果表明,在吞吐量和平均延迟方面,新的iBATD指标优于BATD。
{"title":"iBATD: A New Routing Metric for Multi-radio Wireless Mesh Networks","authors":"Bing Qi, Fangyang Shen, Syed Raza","doi":"10.1109/ITNG.2012.113","DOIUrl":"https://doi.org/10.1109/ITNG.2012.113","url":null,"abstract":"An easy and low-cost approach to address the limit capacity problem in wireless mesh networks that has recently been proposed is to install multiple wireless radios for a single wireless node. Operating the radios within each node on non-overlapping channels can utilize the radio spectrum more greedily and thereby reduces interference and contention. In such multi-radio wireless mesh networks, an effective routing metric should deal with channel diversity in order to make a wise routing path selection. In this paper, we propose a novel routing metric called iBATD (improved Bottleneck Aware Transmission Delay metric)for multi-radio wireless mesh networks. The fundamental idea relies on the observation that the channel with the maximum transmission delay(bottleneck) along one path has the most negative impact on the entire path performance. To accurately measure transmission delay for the bottleneck channel, the iBATD metric improves the BATD routing metric by considering the MAC overhead as well as the link loss rate discrepancy within one path. Our experimental results show that the new iBATD metric outperforms BATD in case of throughput and average latency.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Connect with Your Friends and Share Private Information Safely 连接与您的朋友和分享私人信息安全
A. Ukil
With the advent of ubiquitous computing and social networking, we often attempt to connect to friend of friends (multi-hop friends) and share private information. However, without explicitly being convinced about the trustworthiness of the entire process, private information may be leaked and this causes users to get shy away from participating in such activities where private information requires to be disclosed. In view of that, we propose a privacy preserving trust management scheme where multi-hop trust is established in an effective way. The scheme consists of two parts. In first part, we formulate a way of trust score computation. In second part, we propose an algorithm for discovering the friend for sharing private data using the concept of Ant Colony Optimization (ACO) based meta-heuristics, which achieves privacy preserving search strategy. It is a kind of learning distributed parameters and is simple to implement but efficient in outcome. The advantage of our scheme is that it is highly scalable and the participation of the central server is minimal. We consider the communication part of ubiquitous computing consists of tiny sensor nodes forming Wireless Sensor Networks (WSNs) like that in smart car or smart city.
随着无处不在的计算和社交网络的出现,我们经常试图连接到朋友的朋友(多跳朋友)并分享私人信息。但是,如果没有明确地确信整个过程的可信度,则可能会泄露私人信息,从而导致用户回避参与需要披露私人信息的活动。鉴于此,我们提出了一种保护隐私的信任管理方案,该方案有效地建立了多跳信任。该方案由两部分组成。在第一部分中,我们提出了一种计算信任分数的方法。在第二部分,我们提出了一种基于蚁群优化的元启发式算法来发现共享隐私数据的朋友,实现了保护隐私的搜索策略。它是一种分布式参数学习方法,实现简单,效果好。我们的方案的优点是它是高度可扩展的,并且中央服务器的参与是最小的。我们认为泛在计算的通信部分是由微小的传感器节点组成的无线传感器网络(wsn),就像智能汽车或智能城市中的无线传感器网络一样。
{"title":"Connect with Your Friends and Share Private Information Safely","authors":"A. Ukil","doi":"10.1109/ITNG.2012.92","DOIUrl":"https://doi.org/10.1109/ITNG.2012.92","url":null,"abstract":"With the advent of ubiquitous computing and social networking, we often attempt to connect to friend of friends (multi-hop friends) and share private information. However, without explicitly being convinced about the trustworthiness of the entire process, private information may be leaked and this causes users to get shy away from participating in such activities where private information requires to be disclosed. In view of that, we propose a privacy preserving trust management scheme where multi-hop trust is established in an effective way. The scheme consists of two parts. In first part, we formulate a way of trust score computation. In second part, we propose an algorithm for discovering the friend for sharing private data using the concept of Ant Colony Optimization (ACO) based meta-heuristics, which achieves privacy preserving search strategy. It is a kind of learning distributed parameters and is simple to implement but efficient in outcome. The advantage of our scheme is that it is highly scalable and the participation of the central server is minimal. We consider the communication part of ubiquitous computing consists of tiny sensor nodes forming Wireless Sensor Networks (WSNs) like that in smart car or smart city.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Software Testing with Budget Constraints 预算约束下的软件测试
S. Maity
This article deals with constructions of covering arrays which are extremely useful in software testing in order to guarantee 3-way coverage of parameter values, while trying to minimize the number of test cases. A practical limitation in the realm of testing is budget. In most software development environments, time, computing and human resources needed to perform the testing of a component is strictly limited. In order to deal with such situations, we consider the problem of creating the best possible test suite (covering the maximum number of 3-tuples) within a fixed number of test cases. This paper proposes a method of constructing strength three covering arrays with budget constraints.
本文讨论了覆盖数组的构造,它在软件测试中非常有用,可以保证参数值的三向覆盖,同时尽量减少测试用例的数量。测试领域的一个实际限制是预算。在大多数软件开发环境中,执行组件测试所需的时间、计算和人力资源是严格限制的。为了处理这种情况,我们考虑在固定数量的测试用例中创建最好的测试套件(覆盖最大数量的三元组)的问题。本文提出了一种构造具有预算约束的强度三覆盖阵列的方法。
{"title":"Software Testing with Budget Constraints","authors":"S. Maity","doi":"10.1109/ITNG.2012.44","DOIUrl":"https://doi.org/10.1109/ITNG.2012.44","url":null,"abstract":"This article deals with constructions of covering arrays which are extremely useful in software testing in order to guarantee 3-way coverage of parameter values, while trying to minimize the number of test cases. A practical limitation in the realm of testing is budget. In most software development environments, time, computing and human resources needed to perform the testing of a component is strictly limited. In order to deal with such situations, we consider the problem of creating the best possible test suite (covering the maximum number of 3-tuples) within a fixed number of test cases. This paper proposes a method of constructing strength three covering arrays with budget constraints.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"95 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127988505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method 基于灰度递增/递减法的虹膜图像模板有效保护
M. Mahmud, Muhammad Waqar, A. A. Mirza, Abdul Hanan Bin Abdullah
The proposed techniques in the paper is based on grayscale level incremented/decremented method. In this paper we used CASIA dataset for experimentation. Efficient results were achieved with respect to image hiding validated by entropy. Graphical results are also shown at the end to visualize our results.
本文提出的技术是基于灰度级递增/递减法。本文使用CASIA数据集进行实验。通过熵验证,得到了有效的图像隐藏效果。最后还显示了图形结果,以使我们的结果可视化。
{"title":"Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method","authors":"M. Mahmud, Muhammad Waqar, A. A. Mirza, Abdul Hanan Bin Abdullah","doi":"10.1109/ITNG.2012.131","DOIUrl":"https://doi.org/10.1109/ITNG.2012.131","url":null,"abstract":"The proposed techniques in the paper is based on grayscale level incremented/decremented method. In this paper we used CASIA dataset for experimentation. Efficient results were achieved with respect to image hiding validated by entropy. Graphical results are also shown at the end to visualize our results.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Test-First and Parallel Processing Techniques to ERP Data Conversion 测试优先和并行处理技术在ERP数据转换中的应用
Talukdar S. Asgar, Mohammed Akour, Tariq M. King
Enterprise Resource Planning (ERP) systems provide a unified solution for streamlining the operations and flow of information across multiple divisions of an organization. Most of the functionality in ERP systems is master-data driven, and hence the migration of data from legacy systems to ERP is a very important activity during development. Such data must be correctly migrated so that integration and acceptance testing of specific functionalities can be performed. However, the high complexity of ERP systems, coupled with the large volume of data involved, make ERP data conversion an immense challenge for software practitioners. In this paper we tackle the ERP data conversion problem using a test-first approach. The approach seeks to identify and correct data mapping errors and anomalies prior to initiating the data conversion process. Fixing such errors early can avoid having failures occur during data conversion, thereby resulting in cost and time savings. In an effort to further reduce the length of time spent converting large volumes of data, we perform parallel execution of the data conversion program. We have conducted an industrial case study that applies our approach to two ERP projects with favorable results.
企业资源规划(ERP)系统提供了一个统一的解决方案,用于简化组织中多个部门的操作和信息流。ERP系统中的大多数功能都是由主数据驱动的,因此将数据从遗留系统迁移到ERP是开发过程中非常重要的活动。必须正确地迁移这些数据,以便执行特定功能的集成和验收测试。然而,ERP系统的高度复杂性,加上涉及的大量数据,使得ERP数据转换对软件从业者来说是一个巨大的挑战。在本文中,我们使用测试优先的方法来解决ERP数据转换问题。该方法旨在在开始数据转换过程之前识别和纠正数据映射错误和异常。尽早修复此类错误可以避免在数据转换过程中出现故障,从而节省成本和时间。为了进一步减少转换大量数据所花费的时间,我们对数据转换程序进行并行执行。我们已经进行了一个工业案例研究,将我们的方法应用于两个ERP项目,并取得了良好的结果。
{"title":"Applying Test-First and Parallel Processing Techniques to ERP Data Conversion","authors":"Talukdar S. Asgar, Mohammed Akour, Tariq M. King","doi":"10.1109/ITNG.2012.46","DOIUrl":"https://doi.org/10.1109/ITNG.2012.46","url":null,"abstract":"Enterprise Resource Planning (ERP) systems provide a unified solution for streamlining the operations and flow of information across multiple divisions of an organization. Most of the functionality in ERP systems is master-data driven, and hence the migration of data from legacy systems to ERP is a very important activity during development. Such data must be correctly migrated so that integration and acceptance testing of specific functionalities can be performed. However, the high complexity of ERP systems, coupled with the large volume of data involved, make ERP data conversion an immense challenge for software practitioners. In this paper we tackle the ERP data conversion problem using a test-first approach. The approach seeks to identify and correct data mapping errors and anomalies prior to initiating the data conversion process. Fixing such errors early can avoid having failures occur during data conversion, thereby resulting in cost and time savings. In an effort to further reduce the length of time spent converting large volumes of data, we perform parallel execution of the data conversion program. We have conducted an industrial case study that applies our approach to two ERP projects with favorable results.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121321313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Innovations in Art and Production: Sound, Modeling and Animation 在艺术和生产的创新:声音,建模和动画
V. Janarthanan
Video games, from the very beginning, were made as cartoon images that represented the type of fantasy people wished to be in. Whether the genre was a First Person Shooter or a Role Playing Game, gamers around the world could use their minds to become involved in the situation. With the ever-growing trend in technology, people are able to communicate with fellow gamers from around the world. The reality is that video games and computer gaming of the future would literally blow us all away. They would be so real and so robust that one would be hooked up to them all day. A game in the future would set us up as a perpetual winner, conquer all our fears, challenge us to go beyond anything we've ever dreamed of. That is the future of video games. But in order to achieve these innovations in video games, gaming technology should advance rapidly in the next few years to cache on gamers' interests. In this paper, I have discussed few of those futuristic ideas that would help advance the gaming world.
从一开始,电子游戏就被制作成卡通形象,代表了人们希望进入的幻想类型。无论游戏类型是第一人称射击游戏还是角色扮演游戏,世界各地的玩家都可以运用自己的思维融入情境中。随着科技的不断发展,人们能够与来自世界各地的玩家进行交流。现实情况是,未来的电子游戏和电脑游戏会让我们大吃一惊。它们是如此的真实,如此的健壮,以至于一个人可以整天和它们绑在一起。未来的游戏会让我们成为永远的赢家,征服我们所有的恐惧,挑战我们超越自己的梦想。这就是电子游戏的未来。但为了在电子游戏中实现这些创新,游戏技术应该在未来几年迅速发展,以满足玩家的兴趣。在本文中,我将讨论一些能够推动游戏世界发展的未来理念。
{"title":"Innovations in Art and Production: Sound, Modeling and Animation","authors":"V. Janarthanan","doi":"10.1109/ITNG.2012.80","DOIUrl":"https://doi.org/10.1109/ITNG.2012.80","url":null,"abstract":"Video games, from the very beginning, were made as cartoon images that represented the type of fantasy people wished to be in. Whether the genre was a First Person Shooter or a Role Playing Game, gamers around the world could use their minds to become involved in the situation. With the ever-growing trend in technology, people are able to communicate with fellow gamers from around the world. The reality is that video games and computer gaming of the future would literally blow us all away. They would be so real and so robust that one would be hooked up to them all day. A game in the future would set us up as a perpetual winner, conquer all our fears, challenge us to go beyond anything we've ever dreamed of. That is the future of video games. But in order to achieve these innovations in video games, gaming technology should advance rapidly in the next few years to cache on gamers' interests. In this paper, I have discussed few of those futuristic ideas that would help advance the gaming world.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129370043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Biological Cells as Storage Devices 作为存储设备的生物细胞
Ralph DeFrangesco
Hard drive storage has been made cheaper, faster and larger. Disk storage technology in general has seen incredible advances including reduction in size, an increase in real density, and an increase in internal data rates, but the future of hard disk technology is uncertain. Biological cells are amazing machines. Cells store DNA, the information that is used to create life, and manufacture proteins. This paper proposes using a biological cell as a computer storage device much like a hard drive stores user data today.
硬盘存储变得更便宜、更快、更大。总的来说,磁盘存储技术已经取得了令人难以置信的进步,包括体积的缩小、实际密度的增加和内部数据速率的提高,但硬盘技术的未来仍不确定。生物细胞是神奇的机器。细胞储存DNA,这是用来创造生命和制造蛋白质的信息。本文建议使用生物细胞作为计算机存储设备,就像今天的硬盘驱动器存储用户数据一样。
{"title":"Biological Cells as Storage Devices","authors":"Ralph DeFrangesco","doi":"10.1109/ITNG.2012.154","DOIUrl":"https://doi.org/10.1109/ITNG.2012.154","url":null,"abstract":"Hard drive storage has been made cheaper, faster and larger. Disk storage technology in general has seen incredible advances including reduction in size, an increase in real density, and an increase in internal data rates, but the future of hard disk technology is uncertain. Biological cells are amazing machines. Cells store DNA, the information that is used to create life, and manufacture proteins. This paper proposes using a biological cell as a computer storage device much like a hard drive stores user data today.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Activity Pattern Based Wireless Intrusion Detection System 基于活动模式的无线入侵检测系统
Nur Al Hasan Haldar, M. Abulaish, Syed Asim Pasha
In this paper, we present an intrusion detection system which exploits pattern recognition techniques to model the usage patterns of authenticated users and uses it to detect intrusions in wireless networks. The key idea behind the proposed intrusion detection system is the identification of discriminative features from users activity data and use them to identify intrusions in wireless networks. The detection module uses PCA technique to accumulate interested statistical variables and compares them with the thresholds derived from users activities data. When the variables exceed the estimated thresholds, an alarm is raised to alert about a possible intrusion in the network. The novelty of the proposed system lies in its light-weight design which requires less processing and memory resources and it can be used in real-time environment.
本文提出了一种利用模式识别技术对认证用户的使用模式进行建模的入侵检测系统,并利用该系统检测无线网络中的入侵。提出的入侵检测系统背后的关键思想是从用户活动数据中识别识别特征,并使用它们来识别无线网络中的入侵。检测模块使用PCA技术积累感兴趣的统计变量,并将其与从用户活动数据中获得的阈值进行比较。当变量超过估计的阈值时,就会发出警报,提醒网络中可能存在入侵。该系统的新颖之处在于其轻量化设计,所需的处理和内存资源较少,可用于实时环境。
{"title":"An Activity Pattern Based Wireless Intrusion Detection System","authors":"Nur Al Hasan Haldar, M. Abulaish, Syed Asim Pasha","doi":"10.1109/ITNG.2012.68","DOIUrl":"https://doi.org/10.1109/ITNG.2012.68","url":null,"abstract":"In this paper, we present an intrusion detection system which exploits pattern recognition techniques to model the usage patterns of authenticated users and uses it to detect intrusions in wireless networks. The key idea behind the proposed intrusion detection system is the identification of discriminative features from users activity data and use them to identify intrusions in wireless networks. The detection module uses PCA technique to accumulate interested statistical variables and compares them with the thresholds derived from users activities data. When the variables exceed the estimated thresholds, an alarm is raised to alert about a possible intrusion in the network. The novelty of the proposed system lies in its light-weight design which requires less processing and memory resources and it can be used in real-time environment.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1