首页 > 最新文献

2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering最新文献

英文 中文
Analysis of agent based system in agile methodology 敏捷方法中基于agent的系统分析
S. Priyadarshini, S. Karthik
Agents are probably the fastest growing area in Information Technology. A software agent is a piece of software that functions as an agent for a user or another program, working autonomously and independently in a particular environment. As agents has ability to migrate to any system, perform the tasks and return the results. The field of software agents is a broad and rapidly developing area of research, which encompasses a diverse range of topics and interests. Huge number of researches is going on by comparing the functional similarities of the Human Immune System for making the agents more adaptable with respect to security. An agent-based system was proposed by using functional commonalities of human Nervous system to adapt themselves to threats such as host attack. The agents become aware of the malicious hosts' attack by learning and coordination is maintained by a Co-Agent to make this system work successfully. The idea of learning and coordination are taken from the Human Nervous system functionality. This system has shown a better functioning in maintaining the system performance by making the agents aware of malicious hosts and by producing limited number of clones.
代理可能是信息技术中发展最快的领域。软件代理是软件的一部分,它作为用户或其他程序的代理,在特定环境中自主独立地工作。由于代理能够迁移到任何系统,因此可以执行任务并返回结果。软件代理领域是一个广泛而迅速发展的研究领域,它涵盖了各种各样的主题和兴趣。通过比较人体免疫系统的功能相似性,使药物在安全性方面具有更强的适应性,大量的研究正在进行中。利用人类神经系统的功能共性,提出了一种基于智能体的系统来适应宿主攻击等威胁。代理通过学习意识到恶意主机的攻击,并由协同代理维护协调,使系统成功运行。学习和协调的概念来源于人类神经系统的功能。通过使代理意识到恶意主机并产生有限数量的克隆,该系统在维护系统性能方面表现出更好的功能。
{"title":"Analysis of agent based system in agile methodology","authors":"S. Priyadarshini, S. Karthik","doi":"10.1109/ICPRIME.2013.6496509","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496509","url":null,"abstract":"Agents are probably the fastest growing area in Information Technology. A software agent is a piece of software that functions as an agent for a user or another program, working autonomously and independently in a particular environment. As agents has ability to migrate to any system, perform the tasks and return the results. The field of software agents is a broad and rapidly developing area of research, which encompasses a diverse range of topics and interests. Huge number of researches is going on by comparing the functional similarities of the Human Immune System for making the agents more adaptable with respect to security. An agent-based system was proposed by using functional commonalities of human Nervous system to adapt themselves to threats such as host attack. The agents become aware of the malicious hosts' attack by learning and coordination is maintained by a Co-Agent to make this system work successfully. The idea of learning and coordination are taken from the Human Nervous system functionality. This system has shown a better functioning in maintaining the system performance by making the agents aware of malicious hosts and by producing limited number of clones.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131091842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data integrity and data dynamics with secure storage service in cloud 数据完整性和数据动态与云中的安全存储服务
R. Nithiavathy
The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user's application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
目前对频谱的利用效率很低;因此,如果使用得当,目前可用的频谱并不短缺。因此,预计更灵活地使用频谱和无线电系统之间的频谱共享将是促进未来系统成功实施的关键因素。认知无线电被认为是解决频谱共享问题中最智能和最有前途的技术。在本文中,我们考虑了服务提供商用户之间的频谱共享技术,以共享许可服务提供商的许可频谱。这表明,所提出的技术云计算是即将到来的技术,在当前的It世界中已经获得了很多炒作。云计算被认为是继互联网之后计算机世界的下一个大事件。虽然好处是巨大的,但这种服务也放弃了用户对其外包数据的物理所有权,这不可避免地给云中的数据的正确性带来了新的安全风险。为了解决这一新问题,进一步实现安全可靠的云存储服务。本文提出了一种灵活的分布式存储完整性审计机制,利用同态令牌和分布式擦除编码数据来动态存储数据。提出的设计允许用户或第三方审计员以非常轻量级的通信和更少的计算成本审计云存储。审计结果保证了可靠的云存储正确性,同时实现了快速的数据错误定位,即在其在云中快速变化的数据和用户在云中存储的应用程序中发现哪台服务器行为不正常,还支持对安全的外包数据进行高效的动态操作,包括删除、追加、块修改和抵御拜占庭故障、恶意数据修改攻击。甚至还有服务器串通攻击。
{"title":"Data integrity and data dynamics with secure storage service in cloud","authors":"R. Nithiavathy","doi":"10.1109/ICPRIME.2013.6496459","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496459","url":null,"abstract":"The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user's application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A pioneering tool for text summarization using star map 一个开创性的工具,文本摘要使用星图
M. Kalaiselvan, A. V. Kathiravan
Text Summarization is condensing the source text into a shorter version preserving its information content and overall meaning. It is very difficult for human beings to manually summarize large documents of text. The text summarization method consists of selecting important sentences, paragraphs etc. from the original document and converting them into a star map. The importance of sentences is decided based on statistical and linguistic features of sentences. A star map summarization method consists of understanding the original text and re-telling it in fewer words. This star map is used for duplicate elimination, exam paper evaluator, lesson planning, Identify Shingling. A Pioneering Tool For Text Summarization using Star Map has been presented.
文本摘要是将源文本压缩成一个更短的版本,保留其信息内容和整体意义。对于人类来说,手动总结大量的文本文档是非常困难的。文本摘要方法是从原始文档中选择重要的句子、段落等,并将其转换成星图。句子的重要性是根据句子的统计特征和语言特征来决定的。星图摘要法包括理解原文,然后用更少的词复述。此星图用于消除重复,试卷评估,课程规划,识别Shingling。提出了一种利用星图进行文本摘要的开创性工具。
{"title":"A pioneering tool for text summarization using star map","authors":"M. Kalaiselvan, A. V. Kathiravan","doi":"10.1109/ICPRIME.2013.6496486","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496486","url":null,"abstract":"Text Summarization is condensing the source text into a shorter version preserving its information content and overall meaning. It is very difficult for human beings to manually summarize large documents of text. The text summarization method consists of selecting important sentences, paragraphs etc. from the original document and converting them into a star map. The importance of sentences is decided based on statistical and linguistic features of sentences. A star map summarization method consists of understanding the original text and re-telling it in fewer words. This star map is used for duplicate elimination, exam paper evaluator, lesson planning, Identify Shingling. A Pioneering Tool For Text Summarization using Star Map has been presented.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124097790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mammogram image feature selection using unsupervised tolerance rough set relative reduct algorithm 基于无监督容忍粗糙集相对约简算法的乳房x线图像特征选择
I. L. Aroquiaraj, laurence. raj
Feature Selection (FS) aims to determine a minimal feature subset from a problem domain while retaining a suitably high accuracy in representing the original features. Rough set theory (RST) has been used as such a tool with much success. In the supervised FS methods, various feature subsets are evaluated using an evaluation function or metric to select only those features which are related to the decision classes of the data under consideration. However, for many data mining applications, decision class labels are often unknown or incomplete, thus indicating the significance of unsupervised feature selection. However, in unsupervised learning, decision class labels are not provided. The problem is that not all features are important. Some of the features may be redundant, and others may be irrelevant and noisy. In this paper, a novel unsupervised feature selection in mammogram image, using tolerance rough set based relative reduct is proposed. And also, compared with Tolerance Quick Reduct and PSO - Relative Reduct unsupervised feature selection methods. A typical mammogram image processing system generally consists of mammogram image acquisition, pre-processing of image segmentation, feature extraction, feature selection and classification. The proposed method is used to reduce features from the extracted features and the method is compared with existing unsupervised features selection methods. The proposed method is evaluated through clustering and classification algorithms in K-means and WEKA.
特征选择(Feature Selection, FS)旨在从问题域中确定最小的特征子集,同时在表示原始特征时保持适当的高精度。粗糙集理论(RST)作为这样一种工具已经被成功地使用。在监督FS方法中,使用评估函数或度量来评估各种特征子集,以仅选择与所考虑的数据的决策类相关的特征。然而,对于许多数据挖掘应用,决策类标签往往是未知的或不完整的,这表明了无监督特征选择的重要性。然而,在无监督学习中,不提供决策类标签。问题是并不是所有的功能都很重要。一些特征可能是冗余的,而另一些特征可能是无关的和嘈杂的。本文提出了一种新的基于公差粗糙集的乳腺x线图像无监督特征选择方法。并与公差快速约简和PSO -相对约简两种无监督特征选择方法进行了比较。典型的乳房x光图像处理系统一般包括乳房x光图像采集、图像分割预处理、特征提取、特征选择和分类。利用该方法对提取的特征进行特征约简,并与现有的无监督特征选择方法进行比较。通过K-means和WEKA的聚类和分类算法对所提出的方法进行了评估。
{"title":"Mammogram image feature selection using unsupervised tolerance rough set relative reduct algorithm","authors":"I. L. Aroquiaraj, laurence. raj","doi":"10.1109/ICPRIME.2013.6496718","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496718","url":null,"abstract":"Feature Selection (FS) aims to determine a minimal feature subset from a problem domain while retaining a suitably high accuracy in representing the original features. Rough set theory (RST) has been used as such a tool with much success. In the supervised FS methods, various feature subsets are evaluated using an evaluation function or metric to select only those features which are related to the decision classes of the data under consideration. However, for many data mining applications, decision class labels are often unknown or incomplete, thus indicating the significance of unsupervised feature selection. However, in unsupervised learning, decision class labels are not provided. The problem is that not all features are important. Some of the features may be redundant, and others may be irrelevant and noisy. In this paper, a novel unsupervised feature selection in mammogram image, using tolerance rough set based relative reduct is proposed. And also, compared with Tolerance Quick Reduct and PSO - Relative Reduct unsupervised feature selection methods. A typical mammogram image processing system generally consists of mammogram image acquisition, pre-processing of image segmentation, feature extraction, feature selection and classification. The proposed method is used to reduce features from the extracted features and the method is compared with existing unsupervised features selection methods. The proposed method is evaluated through clustering and classification algorithms in K-means and WEKA.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bijective soft set based classification of medical data 基于双目标软集的医疗数据分类
S. U. Kumar, H. Inbarani, S. S. Kumar
Classification is one of the main issues in Data Mining Research fields. The classification difficulties in medical area frequently classify medical dataset based on the result of medical diagnosis or description of medical treatment by the medical specialist. The Extensive amounts of information and data warehouse in medical databases need the development of specialized tools for storing, retrieving, investigation, and effectiveness usage of stored knowledge and data. Intelligent methods such as neural networks, fuzzy sets, decision trees, and expert systems are, slowly but steadily, applied in the medical fields. Recently, Bijective soft set theory has been proposed as a new intelligent technique for the discovery of data dependencies, data reduction, classification and rule generation from databases. In this paper, we present a novel approach based on Bijective soft sets for the generation of classification rules from the data set. Investigational results from applying the Bijective soft set analysis to the set of data samples are given and evaluated. In addition, the generated rules are also compared to the well-known decision tree classifier algorithm and Naïve bayes. The learning illustrates that the theory of Bijective soft set seems to be a valuable tool for inductive learning and provides a valuable support for building expert systems.
分类是数据挖掘研究领域的主要问题之一。医学领域的分类困难往往是基于医学诊断结果或医学专家对医疗情况的描述对医学数据集进行分类。医学数据库中大量的信息和数据仓库需要开发专门的工具来存储、检索、调查和有效地使用存储的知识和数据。神经网络、模糊集、决策树和专家系统等智能方法正在缓慢而稳定地应用于医学领域。近年来,双目标软集理论作为一种新的智能技术被提出,用于从数据库中发现数据依赖关系、数据约简、分类和规则生成。本文提出了一种基于双射软集的分类规则生成方法。将双射软集分析应用于数据样本集的研究结果给出并进行了评估。此外,还将生成的规则与著名的决策树分类器算法和Naïve bayes进行了比较。研究结果表明,双目标软集理论是一种有价值的归纳学习工具,为构建专家系统提供了有价值的支持。
{"title":"Bijective soft set based classification of medical data","authors":"S. U. Kumar, H. Inbarani, S. S. Kumar","doi":"10.1109/ICPRIME.2013.6496725","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496725","url":null,"abstract":"Classification is one of the main issues in Data Mining Research fields. The classification difficulties in medical area frequently classify medical dataset based on the result of medical diagnosis or description of medical treatment by the medical specialist. The Extensive amounts of information and data warehouse in medical databases need the development of specialized tools for storing, retrieving, investigation, and effectiveness usage of stored knowledge and data. Intelligent methods such as neural networks, fuzzy sets, decision trees, and expert systems are, slowly but steadily, applied in the medical fields. Recently, Bijective soft set theory has been proposed as a new intelligent technique for the discovery of data dependencies, data reduction, classification and rule generation from databases. In this paper, we present a novel approach based on Bijective soft sets for the generation of classification rules from the data set. Investigational results from applying the Bijective soft set analysis to the set of data samples are given and evaluated. In addition, the generated rules are also compared to the well-known decision tree classifier algorithm and Naïve bayes. The learning illustrates that the theory of Bijective soft set seems to be a valuable tool for inductive learning and provides a valuable support for building expert systems.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Mitigation of application DDoS attacks using ASNRI scheme for IP and MAC frames 利用针对 IP 和 MAC 帧的 ASNRI 方案缓解应用程序 DDoS 攻击
S. Prabha, R. Anitha
With increasing trend in application services on large-scale internet scenario of both wired and wireless interface, intimidation to restrain the application service by Distributed Denial of Service (DDoS) attacks become a high-flying issue. Most of the present DDoS attacks resistance method work on application services in wired network and wireless network individually. No method is offered herewith for the two kinds of networks up to now. Though the present internet application services must switch between wired and wireless platform, well-matched resistance method for Distributed Denial of Service attacks have to be coined for better security which is the present requirement in the environment. With these issues in mind, the proposed model develops counter mechanism to mitigate the potency of the resource attacks and evaluate the efficacy. Application Service Network Request Identification (ASNRI) scheme is presented to provide an apparent demarcation of wired service and wireless services request, which is then fed to the Bayes packet classifier for its associated denial of service attack characteristics. From the Bayes packet classifier, resistance filters are stimulated to restrict denial of service attacks in the respective platform, that is., wired or wireless. The simulation of the proposed ASNRI scheme is conducted with NS-2 simulator to show its effectiveness of restricting Distributed Denial of Service attacks in terms of RESPONSE TIME, APPLICATION SERVICE THROUGHPUT, LOAD VARIANCE in the application server.
随着应用服务在有线和无线接口的大规模互联网场景中呈上升趋势,分布式拒绝服务(DDoS)攻击对应用服务的威胁已成为一个高发问题。目前大多数 DDoS 攻击抵御方法都是针对有线网络和无线网络中的应用服务。到目前为止,还没有针对这两种网络的方法。虽然目前的互联网应用服务必须在有线和无线平台之间切换,但为了更好的安全性,必须创造出匹配的分布式拒绝服务攻击抵御方法,这也是目前环境的要求。考虑到这些问题,所提出的模型开发了抵御机制,以减轻资源攻击的威力并评估其有效性。提出的应用服务网络请求识别(ASNRI)方案提供了有线服务和无线服务请求的明显分界,然后将其输入贝叶斯数据包分类器,以确定其相关的拒绝服务攻击特征。通过贝叶斯数据包分类器,可激发阻力过滤器来限制相应平台(即有线或无线平台)上的拒绝服务攻击。利用 NS-2 模拟器对拟议的 ASNRI 方案进行了模拟,以显示其在应用服务器的响应时间、应用服务吞吐量、负载变化等方面限制分布式拒绝服务攻击的有效性。
{"title":"Mitigation of application DDoS attacks using ASNRI scheme for IP and MAC frames","authors":"S. Prabha, R. Anitha","doi":"10.1109/ICPRIME.2013.6496473","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496473","url":null,"abstract":"With increasing trend in application services on large-scale internet scenario of both wired and wireless interface, intimidation to restrain the application service by Distributed Denial of Service (DDoS) attacks become a high-flying issue. Most of the present DDoS attacks resistance method work on application services in wired network and wireless network individually. No method is offered herewith for the two kinds of networks up to now. Though the present internet application services must switch between wired and wireless platform, well-matched resistance method for Distributed Denial of Service attacks have to be coined for better security which is the present requirement in the environment. With these issues in mind, the proposed model develops counter mechanism to mitigate the potency of the resource attacks and evaluate the efficacy. Application Service Network Request Identification (ASNRI) scheme is presented to provide an apparent demarcation of wired service and wireless services request, which is then fed to the Bayes packet classifier for its associated denial of service attack characteristics. From the Bayes packet classifier, resistance filters are stimulated to restrict denial of service attacks in the respective platform, that is., wired or wireless. The simulation of the proposed ASNRI scheme is conducted with NS-2 simulator to show its effectiveness of restricting Distributed Denial of Service attacks in terms of RESPONSE TIME, APPLICATION SERVICE THROUGHPUT, LOAD VARIANCE in the application server.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formalization and analysis of Borda protocol using pi calculus 用圆周率演算形式化和分析Borda协议
B. Kurhade, M. Kshirsagar
E-voting systems are important tools for community participation in essential decisions of society. In comparison with traditional voting systems, e-voting systems have special advantages. Any e-voting system is based on an e-voting protocol. The applied pi calculus is a language used to formalise the protocol. It is a language for describing concurrent processes and their intersections. Properties of processes described in the applied pi calculus can be proved by employing manual techniques or by automated tool such as proverif. A potentially much more secure system could be implemented, based on formal protocols that specify the messages sent to electronic voting machines. Such protocols have been studied for several decades. They offer the possibility of abstract analysis of protocol against formally stated properties. Formal verification techniques are notoriously difficult to design and analyse. Our aim is use verification technique to analyse the protocol. This review paper focus on modelling a known protocol for elections known as BORDA in the applied pi calculus, and this paper also focus on formalizing some of its expected properties, namely eligibility, fairness, Receipt freeness, individual verifiability and privacy. The applied pi calculus has a family of proof techniques which we can use is supported by the proverif tool and has been used to analyse a variety of security protocols.
电子投票系统是社区参与社会重大决策的重要工具。与传统的投票系统相比,电子投票系统具有特殊的优势。任何电子投票系统都是基于电子投票协议的。应用π演算是一种用于形式化协议的语言。它是一种描述并发进程及其交集的语言。应用圆周率演算中描述的过程的性质可以通过人工技术或自动工具(如proverif)来证明。一个潜在的更安全的系统可以实现,基于正式协议,指定发送到电子投票机的消息。这样的协议已经研究了几十年。它们提供了根据正式声明的属性对协议进行抽象分析的可能性。众所周知,形式化验证技术很难设计和分析。我们的目的是利用验证技术对协议进行分析。这篇综述论文的重点是在应用pi演算中对一个已知的选举协议BORDA进行建模,并重点讨论了它的一些预期属性,即资格、公平性、收据自由、个人可验证性和隐私性。应用π演算有一系列证明技术,我们可以使用proverif工具支持,并已用于分析各种安全协议。
{"title":"Formalization and analysis of Borda protocol using pi calculus","authors":"B. Kurhade, M. Kshirsagar","doi":"10.1109/ICPRIME.2013.6496478","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496478","url":null,"abstract":"E-voting systems are important tools for community participation in essential decisions of society. In comparison with traditional voting systems, e-voting systems have special advantages. Any e-voting system is based on an e-voting protocol. The applied pi calculus is a language used to formalise the protocol. It is a language for describing concurrent processes and their intersections. Properties of processes described in the applied pi calculus can be proved by employing manual techniques or by automated tool such as proverif. A potentially much more secure system could be implemented, based on formal protocols that specify the messages sent to electronic voting machines. Such protocols have been studied for several decades. They offer the possibility of abstract analysis of protocol against formally stated properties. Formal verification techniques are notoriously difficult to design and analyse. Our aim is use verification technique to analyse the protocol. This review paper focus on modelling a known protocol for elections known as BORDA in the applied pi calculus, and this paper also focus on formalizing some of its expected properties, namely eligibility, fairness, Receipt freeness, individual verifiability and privacy. The applied pi calculus has a family of proof techniques which we can use is supported by the proverif tool and has been used to analyse a variety of security protocols.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining medical data to identify frequent diseases using Apriori algorithm 利用Apriori算法挖掘医疗数据识别常见疾病
M. Ilayaraja, T. Meyyappan
The data mining is a process of analyzing a huge data from different perspectives and summarizing it into useful information. The information can be converted into knowledge about historical patterns and future trends. Data mining plays a significant role in the field of information technology. Health care industry today generates large amounts of complex data about patients, hospitals resources, diseases, diagnosis methods, electronic patients records, etc,. The data mining techniques are very useful to make medicinal decisions in curing diseases. The healthcare industry collects huge amount of healthcare data which, unfortunately, are not “mined” to discover hidden information for effective decision making. The discovered knowledge can be used by the healthcare administrators to improve the quality of service. In this paper, authors developed a method to identify frequency of diseases in particular geographical area at given time period with the aid of association rule based Apriori data mining technique.
数据挖掘是从不同的角度对海量数据进行分析,并将其总结为有用信息的过程。这些信息可以转化为关于历史模式和未来趋势的知识。数据挖掘在信息技术领域起着重要的作用。当今的医疗保健行业产生了大量复杂的数据,涉及患者、医院资源、疾病、诊断方法、电子病历等。数据挖掘技术对于制定治疗疾病的药物决策非常有用。医疗保健行业收集了大量的医疗保健数据,不幸的是,这些数据没有被“挖掘”,以发现隐藏的信息,从而进行有效的决策。医疗保健管理员可以使用发现的知识来提高服务质量。本文提出了一种基于关联规则的Apriori数据挖掘技术来识别特定地理区域在给定时间段内的疾病频率的方法。
{"title":"Mining medical data to identify frequent diseases using Apriori algorithm","authors":"M. Ilayaraja, T. Meyyappan","doi":"10.1109/ICPRIME.2013.6496471","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496471","url":null,"abstract":"The data mining is a process of analyzing a huge data from different perspectives and summarizing it into useful information. The information can be converted into knowledge about historical patterns and future trends. Data mining plays a significant role in the field of information technology. Health care industry today generates large amounts of complex data about patients, hospitals resources, diseases, diagnosis methods, electronic patients records, etc,. The data mining techniques are very useful to make medicinal decisions in curing diseases. The healthcare industry collects huge amount of healthcare data which, unfortunately, are not “mined” to discover hidden information for effective decision making. The discovered knowledge can be used by the healthcare administrators to improve the quality of service. In this paper, authors developed a method to identify frequency of diseases in particular geographical area at given time period with the aid of association rule based Apriori data mining technique.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence 基于群智能的MANET包复制攻击入侵检测与防御机制
G. Indirani, K. Selvakumar, V. Sivaaamasundari
Due to the nature of a MANET, it is much more vulnerable to attack than a wired network. As a result, an Intrusion Detection System (IDS) for MANETs is designed to detect anomalous behavior and misuse. Swarm intelligence is a relatively novel field. These algorithms, like their natural systems of inspiration, show the desirable properties of being adaptive, scalable, and robust. The objective of this project is to detect and perform defense mechanism for packet replication attack. A Packet replication problem reduced by the NS2 simulator for MANET, each data packet is replicated in the IP layer at its source. The number of replication times is determined by the number of route entries for the destination, each data packet is uniquely identified with the tree-id provided by NS2 and the redundant packets are discarded in the IP layer at the receiver. The Performance of the Intrusion Detection system is verified using the parameters like Throughput, Packet-Received, Packet-Delivery Ratio, End-to-End Latency, Bandwidth and Latency.
由于MANET的性质,它比有线网络更容易受到攻击。为此,本文设计了一种用于manet的入侵检测系统(IDS)来检测异常行为和滥用行为。群体智能是一个相对较新的领域。这些算法,就像它们的自然灵感系统一样,显示出自适应、可扩展和鲁棒性的理想特性。本项目的目的是检测和执行包复制攻击的防御机制。一个数据包复制问题减少了NS2模拟器的MANET,每个数据包在其源的IP层被复制。复制次数由目的路由表项的数量决定,每个数据包用NS2提供的tree-id唯一标识,多余的数据包在接收端IP层被丢弃。采用吞吐量、接收包率、发送包率、端到端延迟、带宽和延迟等参数对入侵检测系统的性能进行了验证。
{"title":"Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence","authors":"G. Indirani, K. Selvakumar, V. Sivaaamasundari","doi":"10.1109/ICPRIME.2013.6496464","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496464","url":null,"abstract":"Due to the nature of a MANET, it is much more vulnerable to attack than a wired network. As a result, an Intrusion Detection System (IDS) for MANETs is designed to detect anomalous behavior and misuse. Swarm intelligence is a relatively novel field. These algorithms, like their natural systems of inspiration, show the desirable properties of being adaptive, scalable, and robust. The objective of this project is to detect and perform defense mechanism for packet replication attack. A Packet replication problem reduced by the NS2 simulator for MANET, each data packet is replicated in the IP layer at its source. The number of replication times is determined by the number of route entries for the destination, each data packet is uniquely identified with the tree-id provided by NS2 and the redundant packets are discarded in the IP layer at the receiver. The Performance of the Intrusion Detection system is verified using the parameters like Throughput, Packet-Received, Packet-Delivery Ratio, End-to-End Latency, Bandwidth and Latency.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Keystroke dynamics for biometric authentication — A survey 生物识别认证的击键动力学研究
S. Bhatt, T. Santhanam
The latest trend in authenticating users is by using the potentiality of biometrics. Keystroke dynamics is a behavioural biometrics which captures the typing rhythms of users and then authenticates them based on the dynamics captured. In this paper, a detailed study on the evolution of keystroke dynamics as a measure of authentication is carried out. This paper gives an insight from the infancy stage to the current work done on this domain which can be used by researchers working on this topic.
验证用户的最新趋势是利用生物识别技术的潜力。击键动力学是一种行为生物识别技术,它捕捉用户的打字节奏,然后根据捕捉到的动态对用户进行身份验证。本文详细地研究了击键动力学作为认证手段的演变过程。本文给出了从婴儿期到目前在这一领域所做的工作的见解,可供研究这一主题的研究人员使用。
{"title":"Keystroke dynamics for biometric authentication — A survey","authors":"S. Bhatt, T. Santhanam","doi":"10.1109/ICPRIME.2013.6496441","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496441","url":null,"abstract":"The latest trend in authenticating users is by using the potentiality of biometrics. Keystroke dynamics is a behavioural biometrics which captures the typing rhythms of users and then authenticates them based on the dynamics captured. In this paper, a detailed study on the evolution of keystroke dynamics as a measure of authentication is carried out. This paper gives an insight from the infancy stage to the current work done on this domain which can be used by researchers working on this topic.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129609524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1