首页 > 最新文献

2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

英文 中文
Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing 多用户可搜索加密与细粒度访问控制没有密钥共享
Qinqin Wang, Yanqin Zhu, Xizhao Luo
Searchable Encryption(SE) schemes allow users to perform keyword search on encrypted data without leakage of the sensitive information. Most of the existing SE schemes are limited to single-user setting or multi-user setting with coarser-grained access control. However, the application that multiple users with different access rights to the sharing data is more practical under the cloud environment. To bridge this gap, we consider searchable encryption with fine-grained access control under multi-user setting in this paper. The proposed scheme requires less computation cost at user side but provides fine-grained access control to authorized users under a new hybrid architecture. Combining symmetric encryption and Cipher text-Policy Attribute based Encryption(CP-ABE), we achieve a user collusion resistant scheme with the help of the private cloud. Our scheme solves a prevalent problem of key sharing. And the exposure of attribute secret key to the public cloud will not affect the system security. Dynamic and efficient user revocation is also provided. Security analysis shows that our scheme is secure.
可搜索加密(SE)方案允许用户在不泄露敏感信息的情况下对加密数据进行关键字搜索。现有的SE方案大多局限于单用户设置或多用户设置,具有粗粒度的访问控制。但是,在云环境下,多个具有不同访问权限的用户对共享数据进行访问的应用更加实用。为了弥补这一缺陷,本文考虑了在多用户设置下具有细粒度访问控制的可搜索加密。该方案减少了用户端的计算成本,同时在新的混合架构下为授权用户提供了细粒度的访问控制。结合对称加密和密码文本-策略属性加密(Cipher text-Policy Attribute based encryption, CP-ABE),在私有云的帮助下实现了一种抗用户合谋的方案。我们的方案解决了一个普遍存在的密钥共享问题。并且属性秘钥向公有云公开不会影响系统的安全性。还提供了动态和有效的用户撤销。安全性分析表明,该方案是安全的。
{"title":"Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing","authors":"Qinqin Wang, Yanqin Zhu, Xizhao Luo","doi":"10.1109/ACSAT.2014.32","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.32","url":null,"abstract":"Searchable Encryption(SE) schemes allow users to perform keyword search on encrypted data without leakage of the sensitive information. Most of the existing SE schemes are limited to single-user setting or multi-user setting with coarser-grained access control. However, the application that multiple users with different access rights to the sharing data is more practical under the cloud environment. To bridge this gap, we consider searchable encryption with fine-grained access control under multi-user setting in this paper. The proposed scheme requires less computation cost at user side but provides fine-grained access control to authorized users under a new hybrid architecture. Combining symmetric encryption and Cipher text-Policy Attribute based Encryption(CP-ABE), we achieve a user collusion resistant scheme with the help of the private cloud. Our scheme solves a prevalent problem of key sharing. And the exposure of attribute secret key to the public cloud will not affect the system security. Dynamic and efficient user revocation is also provided. Security analysis shows that our scheme is secure.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116565923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Modeling a Conceptual Framework for Owner-Contractor Relationship and Time-Cost Trade-Off Using Fuzzy Logic Techniques 基于模糊逻辑技术的业主-承包商关系和时间-成本权衡的概念框架建模
M. A. Al Hazza, Mohammad Al Fadel, E. Adesta
This paper proposes a conceptual framework for owner- contractor relationship and time-cost trade-off analysis of construction project control system using fuzzy logic approach. Construction projects require a well-defined starting point and well-defined finish point with accurate resource allocation to avoid any cost overrun. During the life cycle of the project, different problems can appear. The most important ones are delay and construction cost overrun during the executing phase of the project. To avoid that, an effective planning system with effective control technique is a crucial issue. The main objectives of this research are to develop and design a conceptual framework that may be a guide for the contractor and the owner for controlling the construction projects. The results show that a good conceptual framework need to start with breaking down the project in conjunction with analyzing the cost and time to have both the contractor and the owner the better and less risk in having a good proposal in time, cost and quality. However the final framework show that a need for continuous feedback from the owner to the contractor during the planning process and also can help in designing and developing a proposal that satisfy both the contractor and the owner in terms in time, cost and quality. Risk assessment should be one of the main factors that should be considered during all steps in monitoring, planning and controlling the project. Finally a simulation has been done using the Fuzzy logic approach to validate the conceptual framework).
本文运用模糊逻辑方法,提出了建设项目控制系统中业主-承包商关系和时间-成本权衡分析的概念框架。建设项目需要明确的起点和终点,准确的资源配置,避免成本超支。在项目的生命周期中,可能会出现不同的问题。其中最主要的是工程实施阶段的延误和工程造价超支。为了避免这种情况,一个有效的计划系统和有效的控制技术是一个关键问题。本研究的主要目标是开发和设计一个概念框架,可以作为承包商和业主控制建设项目的指南。结果表明,一个好的概念框架需要从分解项目开始,结合分析成本和时间,使承包商和业主在时间、成本和质量上都能得到一个好的建议,并降低风险。然而,最终的框架表明,在规划过程中,业主需要向承包商提供持续的反馈,这也有助于设计和制定一个在时间、成本和质量方面同时满足承包商和业主的方案。风险评估应该是在监视、计划和控制项目的所有步骤中应考虑的主要因素之一。最后利用模糊逻辑方法进行了仿真,验证了概念框架的有效性。
{"title":"Modeling a Conceptual Framework for Owner-Contractor Relationship and Time-Cost Trade-Off Using Fuzzy Logic Techniques","authors":"M. A. Al Hazza, Mohammad Al Fadel, E. Adesta","doi":"10.1109/ACSAT.2014.38","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.38","url":null,"abstract":"This paper proposes a conceptual framework for owner- contractor relationship and time-cost trade-off analysis of construction project control system using fuzzy logic approach. Construction projects require a well-defined starting point and well-defined finish point with accurate resource allocation to avoid any cost overrun. During the life cycle of the project, different problems can appear. The most important ones are delay and construction cost overrun during the executing phase of the project. To avoid that, an effective planning system with effective control technique is a crucial issue. The main objectives of this research are to develop and design a conceptual framework that may be a guide for the contractor and the owner for controlling the construction projects. The results show that a good conceptual framework need to start with breaking down the project in conjunction with analyzing the cost and time to have both the contractor and the owner the better and less risk in having a good proposal in time, cost and quality. However the final framework show that a need for continuous feedback from the owner to the contractor during the planning process and also can help in designing and developing a proposal that satisfy both the contractor and the owner in terms in time, cost and quality. Risk assessment should be one of the main factors that should be considered during all steps in monitoring, planning and controlling the project. Finally a simulation has been done using the Fuzzy logic approach to validate the conceptual framework).","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Management Dimension for Assessing Organizations' Readiness toward Business Intelligence Systems 评估组织对商业智能系统准备程度的管理维度
A. H. Anjariny, A. Zeki
The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce this failure rate, the authors have developed a conceptual model, based on the existing studies in the field, which may help organizations to assess their readiness toward BI systems. The conceptual model is tested empirically on the Context of Malaysian Organizations(CMOs) as they are emerging widely to BI systems and they lack for this kind of studies to be done them. The conceptual model is consisting of seven dimensions. Depending on the results of the conducted study, this paper will disclose the results of management dimension, which will help to know the degree of its importance for organizations' to be ready for such systems. A brief introduction on BI systems and the challenges of their implementation will be presented. In Addition, this paper will go through some important studies have been done in the field. The details of the study will be provided as well.
商业智能(BI)系统的改进和功能使得许多领域的组织对它们有很高的要求。对这些系统的需求与日俱增。数据显示,每年在商业智能系统上花费数十亿美元。然而,根据一些研究,这些BI项目中有一半以未实现的收益告终。为了减少这种失败率,作者基于该领域的现有研究开发了一个概念模型,该模型可以帮助组织评估他们对BI系统的准备情况。概念模型在马来西亚组织(cmo)的背景下进行了实证测试,因为它们正在广泛地出现在BI系统中,并且它们缺乏这种研究来完成它们。概念模型由七个维度组成。根据所进行的研究结果,本文将披露管理维度的结果,这将有助于了解其对组织为此类系统做好准备的重要性程度。本文将简要介绍BI系统及其实现的挑战。此外,本文还将对该领域已做的一些重要研究进行梳理。研究的细节也将提供。
{"title":"Management Dimension for Assessing Organizations' Readiness toward Business Intelligence Systems","authors":"A. H. Anjariny, A. Zeki","doi":"10.1109/ACSAT.2014.11","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.11","url":null,"abstract":"The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce this failure rate, the authors have developed a conceptual model, based on the existing studies in the field, which may help organizations to assess their readiness toward BI systems. The conceptual model is tested empirically on the Context of Malaysian Organizations(CMOs) as they are emerging widely to BI systems and they lack for this kind of studies to be done them. The conceptual model is consisting of seven dimensions. Depending on the results of the conducted study, this paper will disclose the results of management dimension, which will help to know the degree of its importance for organizations' to be ready for such systems. A brief introduction on BI systems and the challenges of their implementation will be presented. In Addition, this paper will go through some important studies have been done in the field. The details of the study will be provided as well.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber-Attacks Detection & Protection in Kuwait Government Sectors 网络攻击检测科威特政府部门的保护
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, S. AlDabbagh
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps, reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.
当今世界见证了许多网络攻击犯罪,许多人遭受了许多黑客的攻击,他们试图窃取重要信息或破坏受害者计算机中的程序。公司有必要建立不同的保护体系。许多公司都有专门的系统来保护这些黑客的风险。防范网络攻击的过程可以根据三个主要步骤来确定,即被动服务、主动服务和安全质量管理。这些问题将在本研究中讨论,以帮助公司识别针对其计算机系统的不同风险,以结束此类攻击。
{"title":"Cyber-Attacks Detection & Protection in Kuwait Government Sectors","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, S. AlDabbagh","doi":"10.1109/ACSAT.2014.16","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.16","url":null,"abstract":"The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps, reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Career Guidance and Employment Management System 就业指导和就业管理系统
K. Seng, A. Zeki
This paper presents a designing of a web based system for Career Guidance and Employment Management System (CGEMS). Basically, CGEMS is tries to help a user who is looking for career advice guidance, or looking for their opportune job. CGEMS tries to make one place where student, job seeker, career advisor or consultant, and various company or organization can meet and help. In order to help the users to determine their best career choice, this system also offers some tests or quizzes that are related to such career and the user personality which will be useful for the career path. Furthermore, users of CGEMS such as company or organization can post a job description, when they look for employee.
本文介绍了基于web的大学生就业指导与就业管理系统的设计。基本上,CGEMS试图帮助正在寻找职业建议指导或寻找合适工作的用户。CGEMS试图为学生、求职者、职业顾问和各种公司或组织提供一个可以见面和提供帮助的地方。为了帮助用户确定自己的最佳职业选择,该系统还提供了一些与该职业和用户个性相关的测试或测验,这些测试或测验将对职业道路有用。此外,CGEMS的用户,如公司或组织,可以发布职位描述,当他们寻找员工。
{"title":"Career Guidance and Employment Management System","authors":"K. Seng, A. Zeki","doi":"10.1109/ACSAT.2014.20","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.20","url":null,"abstract":"This paper presents a designing of a web based system for Career Guidance and Employment Management System (CGEMS). Basically, CGEMS is tries to help a user who is looking for career advice guidance, or looking for their opportune job. CGEMS tries to make one place where student, job seeker, career advisor or consultant, and various company or organization can meet and help. In order to help the users to determine their best career choice, this system also offers some tests or quizzes that are related to such career and the user personality which will be useful for the career path. Furthermore, users of CGEMS such as company or organization can post a job description, when they look for employee.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Location-Aware Mobile Crime Information Framework for Fast Tracking Response to Accidents and Crimes in Big Cities 大城市事故和犯罪快速跟踪响应的位置感知移动犯罪信息框架
T. Mantoro, Feriadi, Nazori Agani, M. A. Ayu, D. Jatikusumo
Recently the number of accidents and crimes are arising in many big cities. Mobile applications with location aware systems can be utilized in providing location information of the crime. The problem is that location information provided by mobile phones has not been fully utilized. Mostly mobile phones used for its main functions which are for calling and messaging. This paper argues that location information can be used for reporting accident and crime, so that a quick and fast response can be achieved. This study proposes a framework of mobile crime information assistance to help the users (victim) from locus delicti (location where accident or crime happened) with location aware capabilities. Using this framework, mobile app can send and receive location of crimes including the scenes (images) to the nearest police station or central police station. The system can offer a facility to track the location of the nearest police station by accessing a built-in database with a combination of Google map APIs and send the scene/image of the crime location as one complete set of report to the police station. This will allow the police to find the location of the accident right away and increase the safety of the resident in big cities.
最近,在许多大城市,事故和犯罪的数量正在上升。可以利用具有位置感知系统的移动应用程序提供犯罪的位置信息。问题是手机提供的位置信息没有得到充分利用。手机的主要功能是打电话和发短信。本文认为,位置信息可以用于报告事故和犯罪,从而实现快速和快速的反应。本研究提出一个行动犯罪资讯协助框架,以协助使用者(受害者)从事故或犯罪发生地获得位置感知能力。使用这个框架,手机应用程序可以发送和接收犯罪的位置,包括现场(图像)到最近的警察局或中央警察局。该系统可以通过访问内置数据库,结合谷歌地图api,提供跟踪最近警察局位置的设施,并将犯罪地点的现场/图像作为一套完整的报告发送给警察局。这将使警方能够立即找到事故地点,并提高大城市居民的安全。
{"title":"Location-Aware Mobile Crime Information Framework for Fast Tracking Response to Accidents and Crimes in Big Cities","authors":"T. Mantoro, Feriadi, Nazori Agani, M. A. Ayu, D. Jatikusumo","doi":"10.1109/ACSAT.2014.41","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.41","url":null,"abstract":"Recently the number of accidents and crimes are arising in many big cities. Mobile applications with location aware systems can be utilized in providing location information of the crime. The problem is that location information provided by mobile phones has not been fully utilized. Mostly mobile phones used for its main functions which are for calling and messaging. This paper argues that location information can be used for reporting accident and crime, so that a quick and fast response can be achieved. This study proposes a framework of mobile crime information assistance to help the users (victim) from locus delicti (location where accident or crime happened) with location aware capabilities. Using this framework, mobile app can send and receive location of crimes including the scenes (images) to the nearest police station or central police station. The system can offer a facility to track the location of the nearest police station by accessing a built-in database with a combination of Google map APIs and send the scene/image of the crime location as one complete set of report to the police station. This will allow the police to find the location of the accident right away and increase the safety of the resident in big cities.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment 云模拟与绿色云在云环境下能耗测量中的比较
Saleh Atiewi, S. Yussof
Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-tenancy, server utilization, and data center efficiency. Considering the huge amount of energy consumed by computing equipment in the last several years, energy consumption and sustainability have become one of the main areas of research. Thus, obtaining high performance at a reduced cost in cloud environments has reached a turning point where computing power is no longer the most important concern. Calculate the amount of energy consumption in a real cloud computing infrastructure is difficult. Thus, simulation tools have been developed in recent years to enable cloud computing researchers to analyze a cloud computing environment. This paper will introduce and compare the two popular cloud simulators: Cloud Sim and Green Cloud. Both simulators provide scenarios for cloud computing based on utilization, virtualization, and load and energy consumption of the server. The comparison showed that the Green Cloud simulator is more advantageous than the Cloud Sim simulator based on an accurate measurement of energy consumption in a cloud computing environment.
云计算是一种依赖于共享计算资源而不是使用本地服务器或个人设备来处理应用程序的模型。大量研究表明,通过用云基础设施取代传统计算,可以降低总功耗,因为云计算功耗受到四个关键云因素的影响:动态供应、多租户、服务器利用率和数据中心效率。考虑到过去几年计算设备消耗的大量能源,能源消耗和可持续性已成为研究的主要领域之一。因此,在云环境中以较低的成本获得高性能已经达到了一个转折点,计算能力不再是最重要的问题。在真正的云计算基础设施中计算能耗是很困难的。因此,近年来开发了仿真工具,使云计算研究人员能够分析云计算环境。本文将介绍和比较两种流行的云模拟器:cloud Sim和Green cloud。这两个模拟器都提供了基于服务器利用率、虚拟化、负载和能耗的云计算场景。对比表明,基于对云计算环境中能耗的精确测量,Green Cloud模拟器比Cloud Sim模拟器更具优势。
{"title":"Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment","authors":"Saleh Atiewi, S. Yussof","doi":"10.1109/ACSAT.2014.9","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.9","url":null,"abstract":"Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-tenancy, server utilization, and data center efficiency. Considering the huge amount of energy consumed by computing equipment in the last several years, energy consumption and sustainability have become one of the main areas of research. Thus, obtaining high performance at a reduced cost in cloud environments has reached a turning point where computing power is no longer the most important concern. Calculate the amount of energy consumption in a real cloud computing infrastructure is difficult. Thus, simulation tools have been developed in recent years to enable cloud computing researchers to analyze a cloud computing environment. This paper will introduce and compare the two popular cloud simulators: Cloud Sim and Green Cloud. Both simulators provide scenarios for cloud computing based on utilization, virtualization, and load and energy consumption of the server. The comparison showed that the Green Cloud simulator is more advantageous than the Cloud Sim simulator based on an accurate measurement of energy consumption in a cloud computing environment.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Social Networks Peacebuilding Event Mining: A Systematic Literature Review 社会网络建设和平事件挖掘:系统文献综述
Muniba Shaikh, Norsaremah Salleh, Lili Marziana
Social Networks (SNs) becomes one of the essential platform for reporting real time events now a days. SNs has been used by millions of people around the world for sharing thoughts and daily life events on many topics, either it is political, crisis, Peace building (Pb). The objective of this paper is to get insight of Pb Event Mining (EM) from SNs (e.g., Tweets, Fb posts, etc) by conducting the Systematic Literature Review (SLR) process. The paper aims to answer some research questions (RQs) that includes, 1) Which SN's has been widely used for Textual Pb Event Mining PbEM?, 2) What Context or setting has been focussed of PbEM studies and how to categorize Pb events?, and 3) What other types of events (non-Pb) are reported? The SLR process has been used to identify the related literature and for analysis of evidences in order to answer the RQs. This paper concluded on the basis of SLR studies that the "Twitter" is widely used SN for Textual PbEM because 54 out of 64 studies on PbEM uses Twitter. SLR resulted that earth quake (EQ) events are the major concerned events that effect country's economy and peace therefore most of studies uses the EQ as context/setting. The paper presents the details on categories of Pb events, contexts/settings and the list of other types of events or topics that are the center of the research now a days based on synthesis of evidences.
如今,社交网络(SNs)成为实时报道事件的重要平台之一。世界各地数以百万计的人们使用社交网络来分享各种话题的想法和日常生活事件,无论是政治、危机还是建设和平(Pb)。本文的目的是通过进行系统文献综述(SLR)过程,从SNs(例如Tweets, Fb帖子等)中获得Pb事件挖掘(EM)的见解。本文旨在回答一些研究问题(RQs),包括:1)哪些SN被广泛用于文本Pb事件挖掘PbEM?2) pbm研究的主要背景和环境是什么?如何对铅事件进行分类?3)报告了哪些其他类型的事件(非pb) ?单反过程已被用于识别相关文献和分析证据,以回答rq。本文在SLR研究的基础上得出结论,“Twitter”是文本PbEM中被广泛使用的SN,因为64项关于PbEM的研究中有54项使用了Twitter。SLR结果表明,地震(EQ)事件是影响国家经济与和平的主要关注事件,因此大多数研究使用EQ作为背景/设置。本文在综合证据的基础上,详细介绍了Pb事件的类别、背景/设置以及当今研究中心的其他类型事件或主题的列表。
{"title":"Social Networks Peacebuilding Event Mining: A Systematic Literature Review","authors":"Muniba Shaikh, Norsaremah Salleh, Lili Marziana","doi":"10.1109/ACSAT.2014.28","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.28","url":null,"abstract":"Social Networks (SNs) becomes one of the essential platform for reporting real time events now a days. SNs has been used by millions of people around the world for sharing thoughts and daily life events on many topics, either it is political, crisis, Peace building (Pb). The objective of this paper is to get insight of Pb Event Mining (EM) from SNs (e.g., Tweets, Fb posts, etc) by conducting the Systematic Literature Review (SLR) process. The paper aims to answer some research questions (RQs) that includes, 1) Which SN's has been widely used for Textual Pb Event Mining PbEM?, 2) What Context or setting has been focussed of PbEM studies and how to categorize Pb events?, and 3) What other types of events (non-Pb) are reported? The SLR process has been used to identify the related literature and for analysis of evidences in order to answer the RQs. This paper concluded on the basis of SLR studies that the \"Twitter\" is widely used SN for Textual PbEM because 54 out of 64 studies on PbEM uses Twitter. SLR resulted that earth quake (EQ) events are the major concerned events that effect country's economy and peace therefore most of studies uses the EQ as context/setting. The paper presents the details on categories of Pb events, contexts/settings and the list of other types of events or topics that are the center of the research now a days based on synthesis of evidences.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OLBCA: A New Lightweight Block Cipher Algorithm OLBCA:一种新的轻量级分组密码算法
S. AlDabbagh, I. A. Al Shaikhli
Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block cipher algorithm is chosen because it is one of the most common and famous lightweight algorithms. Also, the International Organization for Standardization and the International Electro technical Commission (ISO/IEC 29192-2:2012) declared that PRESENT as a new international standard for lightweight cryptographic methods. We applied three attacks differential, integral attacks and boomerang attack. The results showed that OLBCA is better than PRESENT algorithms in three factors.
轻量级分组密码算法对于约束环境至关重要。对(安全和成本)、(安全和性能)、(成本和性能)等任意两个因素进行优化的算法很容易提出,但对三个因素同时进行优化的算法很难提出。本文提出了一种新的轻量级分组密码算法OLBCA。本文之所以选择PRESENT轻量级分组密码算法,是因为它是最常见、最著名的轻量级算法之一。此外,国际标准化组织和国际电工委员会(ISO/IEC 29192-2:2012)宣布PRESENT作为轻量级加密方法的新国际标准。我们应用了三种攻击:微分攻击、积分攻击和回旋攻击。结果表明,OLBCA算法在三个方面都优于PRESENT算法。
{"title":"OLBCA: A New Lightweight Block Cipher Algorithm","authors":"S. AlDabbagh, I. A. Al Shaikhli","doi":"10.1109/ACSAT.2014.10","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.10","url":null,"abstract":"Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block cipher algorithm is chosen because it is one of the most common and famous lightweight algorithms. Also, the International Organization for Standardization and the International Electro technical Commission (ISO/IEC 29192-2:2012) declared that PRESENT as a new international standard for lightweight cryptographic methods. We applied three attacks differential, integral attacks and boomerang attack. The results showed that OLBCA is better than PRESENT algorithms in three factors.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133411431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Graph Theory and Cyber Security 图论与网络安全
Harith A. Dawood
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.
图论是离散数学中最重要的领域之一。图论是离散结构,由顶点和连接这些顶点的边组成。几乎所有能想到的学科中的问题都可以用图模型来解决。场图论从1735年的柯尼斯堡桥问题开始了它的旅程。本文对希望更多地了解网络安全、密码学和基于图论的网络安全的应用数学家具有指导意义。本文简要概述了该主题和图论在计算机安全中的应用,并提供了该领域的关键研究和最新调查论文的指针。
{"title":"Graph Theory and Cyber Security","authors":"Harith A. Dawood","doi":"10.1109/ACSAT.2014.23","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.23","url":null,"abstract":"One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1