首页 > 最新文献

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY最新文献

英文 中文
A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research 构建网络犯罪研究主题图的本体学习方法综述
Pub Date : 2019-02-01 DOI: 10.24297/IJCT.V18I0.8063
K. J. Lee
Conducting an academic research requires getting a firm grasp of ongoing research issues as well as locating research materials effectively. Often research in different fields on a similar topic can assume diverse approaches due to different objectives and research goals in their own fields. Especially in an interdisciplinary research field like cybercrime, many research topics overlap with those of other research fields. Researchers in such a field, therefore, can benefit from understanding the related domains of one’s own research.  Topic maps provide methods for understanding research domain and managing relevant information resources at the same time. In this paper, we review a topic map solution to acquire knowledge structure and to locate information resources effectively. We address current problems of cybercrime research, review previous studies that use automated methods for topic map creation, and examine existing sets of methods for automatically extracting topic map components. Especially, the methods we discuss here are text mining techniques for extracting ontology components, denoted as ontology learning.
进行学术研究需要对正在进行的研究问题有一个牢固的把握,并有效地定位研究材料。由于各自领域的目标和研究目标不同,在不同领域对类似主题的研究通常可以采用不同的方法。特别是在网络犯罪这样一个跨学科的研究领域,许多研究课题与其他研究领域的课题重叠。因此,这一领域的研究人员可以从了解自己研究的相关领域中受益。主题图为理解研究领域和管理相关信息资源提供了方法。本文提出了一种主题图方法来获取知识结构和有效地定位信息资源。我们讨论了网络犯罪研究的当前问题,回顾了以前使用自动化方法创建主题图的研究,并检查了自动提取主题图组件的现有方法集。特别是,我们在这里讨论的方法是用于提取本体组件的文本挖掘技术,称为本体学习。
{"title":"A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research","authors":"K. J. Lee","doi":"10.24297/IJCT.V18I0.8063","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8063","url":null,"abstract":"Conducting an academic research requires getting a firm grasp of ongoing research issues as well as locating research materials effectively. Often research in different fields on a similar topic can assume diverse approaches due to different objectives and research goals in their own fields. Especially in an interdisciplinary research field like cybercrime, many research topics overlap with those of other research fields. Researchers in such a field, therefore, can benefit from understanding the related domains of one’s own research.  Topic maps provide methods for understanding research domain and managing relevant information resources at the same time. In this paper, we review a topic map solution to acquire knowledge structure and to locate information resources effectively. We address current problems of cybercrime research, review previous studies that use automated methods for topic map creation, and examine existing sets of methods for automatically extracting topic map components. Especially, the methods we discuss here are text mining techniques for extracting ontology components, denoted as ontology learning.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Agile Development and Its Tools Support Digital Transformation 敏捷开发及其工具如何支持数字化转型
Pub Date : 2019-02-01 DOI: 10.24297/IJCT.V18I0.8060
Fatimah Alruwaili, Muna Alrajhi, Kawther A. Saeedi
Digital transformation is the enabler for new reform of businesses, socialites and governments. It is also the platform to the 2030 Vision in Saudi Arabia and in many other countries. Agile Manifesto succeeded to manage software development in a rapid and reliable fashion. Furthermore, incremental delivery of software release ensure that software audiences are engaged while delivering the product, their comments are considered in every function and any changes in requirements are based on imperial use of the software. This ensure the delivery of functionalities matching customer demands as well as reduce project failure risk. For this reason, Agility has been adopted in most software companies as a guaranteed and easy way to implement the digital solutions for their companies. This paper examines the characteristics of agile frameworks, such as Scrum and XP, and Agile tools, such as Jira, Agilo, and others, that facilitate digital transformation. Then compare productivity and efficacy of agile frameworks with traditional SDLC methods. The paper is concluded with the features of agile framework that enable digital transformation such as incremental development, flexible requirements and customer engagement.   
数字化转型是企业、社会和政府新改革的推动者。它也是沙特阿拉伯和许多其他国家实施2030年愿景的平台。敏捷宣言成功地以一种快速可靠的方式管理软件开发。此外,软件发布的增量交付确保了软件受众在交付产品时的参与,他们的评论在每个功能中都被考虑,需求中的任何变化都是基于对软件的合理使用。这确保了功能的交付符合客户的需求,并降低了项目失败的风险。由于这个原因,敏捷已经被大多数软件公司采用,作为一种保证和简单的方法来为他们的公司实现数字解决方案。本文考察了敏捷框架(如Scrum和XP)和敏捷工具(如Jira、Agilo等)的特点,它们促进了数字化转型。然后比较敏捷框架与传统SDLC方法的生产力和效率。本文总结了敏捷框架的特点,使数字化转型,如增量开发,灵活的需求和客户参与。
{"title":"How Agile Development and Its Tools Support Digital Transformation","authors":"Fatimah Alruwaili, Muna Alrajhi, Kawther A. Saeedi","doi":"10.24297/IJCT.V18I0.8060","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8060","url":null,"abstract":"Digital transformation is the enabler for new reform of businesses, socialites and governments. It is also the platform to the 2030 Vision in Saudi Arabia and in many other countries. Agile Manifesto succeeded to manage software development in a rapid and reliable fashion. Furthermore, incremental delivery of software release ensure that software audiences are engaged while delivering the product, their comments are considered in every function and any changes in requirements are based on imperial use of the software. This ensure the delivery of functionalities matching customer demands as well as reduce project failure risk. For this reason, Agility has been adopted in most software companies as a guaranteed and easy way to implement the digital solutions for their companies. This paper examines the characteristics of agile frameworks, such as Scrum and XP, and Agile tools, such as Jira, Agilo, and others, that facilitate digital transformation. Then compare productivity and efficacy of agile frameworks with traditional SDLC methods. The paper is concluded with the features of agile framework that enable digital transformation such as incremental development, flexible requirements and customer engagement.   ","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Electric-Power Distribution and Load-Sharing on Smart-Grids: Analysis by Artificial Neural Network 基于人工神经网络的智能电网最优配电与负荷分担分析
Pub Date : 2019-01-24 DOI: 10.24297/IJCT.V18I0.8059
D. D. Groff, R. Melendez, P. Neelakanta, Hajar Akif
This study refers to developing an electric-power distribution system  with optimal/suboptimal load-sharing in the complex and expanding metro power-grid infrastructure.  That is, the relevant exercise is to indicate a smart forecasting strategy on optimal/suboptimal power-distribution to consumers served by a smart-grid utility.  An artificial neural network (ANN) is employed to model the said optimal power-distribution between generating sources and distribution centers.  A compatible architecture of the test ANN with ad hoc suites of training/prediction schedules is indicated thereof. Pertinent exercise is to determine smartly the power supported on each transmission-line  between generating to distribution-nodes.  Further, a “smart” decision protocol prescribing  the constraint that no transmission-line carries in excess of a desired load.  An algorithm is developed to implement the prescribed constraint via the test ANN; and, each value of the load  shared by each distribution-line  (meeting the power-demand of the consumers) is elucidated from the ANN output. The test ANN includes the use of a traditional multilayer architecture with feed-forward and backpropagation techniques; and,  a fast convergence algorithm (deduced in terms of eigenvalues of a Hessian matrix associated with the input data) is adopted. Further, a novel method based on information-theoretic heuristics (in Shannon’s sense) is invoked towards model specifications. Lastly, the study results are discussed with exemplified computations using appropriate field data.    
本文研究的是在复杂且不断扩大的地铁电网基础设施中,开发一种具有最优/次最优负荷分担的配电系统。也就是说,相关的练习是指出智能电网公用事业服务的消费者的最优/次最优功率分配的智能预测策略。采用人工神经网络(ANN)对发电源和配电中心之间的最优功率分配进行建模。其中指出了具有特殊训练/预测计划套件的测试人工神经网络的兼容架构。相关的练习是巧妙地确定在发配电节点之间的每条输电线上所支持的功率。此外,“智能”决策协议规定了不允许在线传输超过期望负载的约束。提出了一种通过测试人工神经网络实现规定约束的算法;根据人工神经网络的输出,确定各配电线路所分担的负荷(满足用户的电力需求)的每个值。测试人工神经网络包括使用传统的多层结构与前馈和反向传播技术;采用快速收敛算法(根据与输入数据相关的Hessian矩阵的特征值推导)。在此基础上,提出了一种基于信息启发式的模型规范处理方法。最后,利用适当的现场数据,通过算例对研究结果进行了讨论。
{"title":"Optimal Electric-Power Distribution and Load-Sharing on Smart-Grids: Analysis by Artificial Neural Network","authors":"D. D. Groff, R. Melendez, P. Neelakanta, Hajar Akif","doi":"10.24297/IJCT.V18I0.8059","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8059","url":null,"abstract":"This study refers to developing an electric-power distribution system  with optimal/suboptimal load-sharing in the complex and expanding metro power-grid infrastructure.  That is, the relevant exercise is to indicate a smart forecasting strategy on optimal/suboptimal power-distribution to consumers served by a smart-grid utility.  An artificial neural network (ANN) is employed to model the said optimal power-distribution between generating sources and distribution centers.  A compatible architecture of the test ANN with ad hoc suites of training/prediction schedules is indicated thereof. Pertinent exercise is to determine smartly the power supported on each transmission-line  between generating to distribution-nodes.  Further, a “smart” decision protocol prescribing  the constraint that no transmission-line carries in excess of a desired load.  An algorithm is developed to implement the prescribed constraint via the test ANN; and, each value of the load  shared by each distribution-line  (meeting the power-demand of the consumers) is elucidated from the ANN output. The test ANN includes the use of a traditional multilayer architecture with feed-forward and backpropagation techniques; and,  a fast convergence algorithm (deduced in terms of eigenvalues of a Hessian matrix associated with the input data) is adopted. Further, a novel method based on information-theoretic heuristics (in Shannon’s sense) is invoked towards model specifications. Lastly, the study results are discussed with exemplified computations using appropriate field data.    ","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Multimodal Images Classification Based on DSMT Using Visual Saliency Model Fusion With SVM 基于视觉显著性模型与SVM融合的DSMT多模态图像分类改进
Pub Date : 2019-01-09 DOI: 10.24297/IJCT.V18I0.7956
Hanan Anzid, Gaëtan Le Goïc, A. Bekkari, A. Mansouri, D. Mammass
Multimodal images carry available information that can be complementary, redundant information, and overcomes the various problems attached to the unimodal classification task, by modeling and combining these information together. Although, this classification gives acceptable classification results, it still does not reach the level of the visual perception model that has a great ability to classify easily observed scene thanks to the powerful mechanism of the human brain.  In order to improve the classification task in multimodal image area, we propose a methodology based on Dezert-Smarandache formalism (DSmT), allowing fusing the combined spectral and dense SURF features extracted from each modality and pre-classified by the SVM classifier. Then we integrate the visual perception model in the fusion process. To prove the efficiency of the use of salient features in a fusion process with DSmT, the proposed methodology is tested and validated on a large datasets extracted from acquisitions on cultural heritage wall paintings. Each set implements four imaging modalities covering UV, IR, Visible and fluorescence, and the results are promising.
多模态图像携带的可用信息可以是互补的、冗余的信息,通过对这些信息进行建模和组合,克服了单模态分类任务所附带的各种问题。虽然这种分类给出了可以接受的分类结果,但由于人脑强大的机制,它还没有达到视觉感知模型对容易观察到的场景有很强分类能力的水平。为了改进多模态图像区域的分类任务,我们提出了一种基于Dezert-Smarandache形式(DSmT)的方法,允许融合从每个模态提取的组合光谱和密集SURF特征,并由SVM分类器进行预分类。然后在融合过程中对视觉感知模型进行融合。为了证明在融合过程中使用显著特征与DSmT的效率,在从文物壁画中提取的大型数据集上对所提出的方法进行了测试和验证。每组实现四种成像模式,包括紫外,红外,可见光和荧光,结果是有希望的。
{"title":"Improvement of Multimodal Images Classification Based on DSMT Using Visual Saliency Model Fusion With SVM","authors":"Hanan Anzid, Gaëtan Le Goïc, A. Bekkari, A. Mansouri, D. Mammass","doi":"10.24297/IJCT.V18I0.7956","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7956","url":null,"abstract":"Multimodal images carry available information that can be complementary, redundant information, and overcomes the various problems attached to the unimodal classification task, by modeling and combining these information together. Although, this classification gives acceptable classification results, it still does not reach the level of the visual perception model that has a great ability to classify easily observed scene thanks to the powerful mechanism of the human brain. \u0000 In order to improve the classification task in multimodal image area, we propose a methodology based on Dezert-Smarandache formalism (DSmT), allowing fusing the combined spectral and dense SURF features extracted from each modality and pre-classified by the SVM classifier. Then we integrate the visual perception model in the fusion process. \u0000To prove the efficiency of the use of salient features in a fusion process with DSmT, the proposed methodology is tested and validated on a large datasets extracted from acquisitions on cultural heritage wall paintings. Each set implements four imaging modalities covering UV, IR, Visible and fluorescence, and the results are promising.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129682955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CONTEXT AWARENESS FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS: A SURVEY OF SELECTED SMALL AND MEDIUM ENTERPRISES IN NAKURU TOWN, KENYA 开发移动应用程序的上下文感知框架:对肯尼亚纳库鲁镇选定的中小型企业的调查
Pub Date : 2019-01-02 DOI: 10.24297/IJCT.V18I0.7788
Peter Siele
Mobile applications act as valuable tools that can be used by entrepreneurs and small and medium enterprises (SMEs) alike to market their products/services and considerably reduce costs of doing business. The government of Kenya has invested billions of shillings in laying of fiber optic cables in Kenya, improving Kenya‘s ICT sector and coming up with projects aimed at promoting the use of technology among businesses and citizens alike. With all of these investments, there are challenges that hinder the use of business mobile applications by SMEs. Although context awareness in mobile applications is gaining recognition among mobile user and developer communities, many design scenarios still do not incorporate required context awareness as one of their primary goals. Although there are strong context awareness frameworks for mobile applications, there is still potential to improve the usability of virtual learning systems. The study established that the concept of context independence including the physical context independence and the logical context independence from the applications and mobile devices provides a graceful solution in the form of a methodological framework for the development of context-aware systems for SMEs in Nakuru Town.
移动应用程序是企业家和中小型企业(sme)都可以使用的有价值的工具,可以推销他们的产品/服务,并大大降低经营成本。肯尼亚政府已投资数十亿先令在国内铺设光纤电缆,改善肯尼亚的资讯通讯科技(ICT)产业,并推出多项计划,旨在促进企业与民众使用科技。尽管有这些投资,但仍存在阻碍中小企业使用商业移动应用程序的挑战。尽管移动应用程序中的上下文感知正在获得移动用户和开发人员社区的认可,但许多设计场景仍然没有将所需的上下文感知作为其主要目标之一。尽管移动应用程序有强大的上下文感知框架,但仍有潜力提高虚拟学习系统的可用性。该研究确立了上下文独立的概念,包括物理上下文独立和逻辑上下文独立于应用程序和移动设备,为Nakuru镇中小企业的上下文感知系统的开发提供了一个方法论框架形式的优雅解决方案。
{"title":"CONTEXT AWARENESS FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS: A SURVEY OF SELECTED SMALL AND MEDIUM ENTERPRISES IN NAKURU TOWN, KENYA","authors":"Peter Siele","doi":"10.24297/IJCT.V18I0.7788","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7788","url":null,"abstract":"Mobile applications act as valuable tools that can be used by entrepreneurs and small and medium enterprises (SMEs) alike to market their products/services and considerably reduce costs of doing business. The government of Kenya has invested billions of shillings in laying of fiber optic cables in Kenya, improving Kenya‘s ICT sector and coming up with projects aimed at promoting the use of technology among businesses and citizens alike. With all of these investments, there are challenges that hinder the use of business mobile applications by SMEs. Although context awareness in mobile applications is gaining recognition among mobile user and developer communities, many design scenarios still do not incorporate required context awareness as one of their primary goals. Although there are strong context awareness frameworks for mobile applications, there is still potential to improve the usability of virtual learning systems. The study established that the concept of context independence including the physical context independence and the logical context independence from the applications and mobile devices provides a graceful solution in the form of a methodological framework for the development of context-aware systems for SMEs in Nakuru Town.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform 离散傅里叶变换中使用混沌Cat映射的图像加密
Pub Date : 2018-11-29 DOI: 10.24297/IJCT.V18I0.7907
M. Alzain
The paper presents an secure image using the two dimensional chaotic cat mapping  (2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier transformed image are scrambled using the 2D-CCM and finally an inverse DFT is applied to obtain the final encrypted image. The decryption phase applies a reverse  procedure to get the original plainimage. A set of encryption test experiments are employed to inspect the proposed DFT based 2D-CCM image cryptosystem. The experimental results verified and confirmed the superiority of the proposed DFT based 2D-CCM image cryptosystem.
本文提出了在离散傅立叶变换域(DFT)使用二维混沌cat映射(2D-CCM)的安全图像。加密阶段首先对待加密的明文图像应用DFT,然后使用2D-CCM对得到的傅里叶变换后的图像进行置乱,最后应用逆DFT获得最终的加密图像。解密阶段应用一个反向过程来获得原始的明文图像。采用一组加密测试实验对所提出的基于DFT的2D-CCM图像密码系统进行了检验。实验结果验证了所提出的基于DFT的2D-CCM图像密码系统的优越性。
{"title":"Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform","authors":"M. Alzain","doi":"10.24297/IJCT.V18I0.7907","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7907","url":null,"abstract":"The paper presents an secure image using the two dimensional chaotic cat mapping  (2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier transformed image are scrambled using the 2D-CCM and finally an inverse DFT is applied to obtain the final encrypted image. The decryption phase applies a reverse  procedure to get the original plainimage. A set of encryption test experiments are employed to inspect the proposed DFT based 2D-CCM image cryptosystem. The experimental results verified and confirmed the superiority of the proposed DFT based 2D-CCM image cryptosystem.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Moving Region Detection for Static Camera 静态摄像机的运动区域检测方法
Pub Date : 2018-11-14 DOI: 10.24297/IJCT.V12I6.3142
P. Goel, P. Kotak, A. Gupta
The moving object detection from a stationary video sequence is a primary task in various computer vision applications. In this proposed system; three processing levels are suppose to perform: detects moving objects region from the background image; reduce noise from the pixels of detected region and extract meaningful objects and their features (area of object, center point of area etc.). In this paper; background subtraction techniques is used for segments moving objects from the background image, which is capable for pixel level processing. Morphology operation (Erosion and dilation) are used to remove pixel to pixel noise. In last level, CCL algorithm is used for sorts out foregrounds pixels are grouped into meaningful connected regions and their features.
从静止视频序列中检测运动目标是各种计算机视觉应用的主要任务。在这个拟议的系统中;处理过程分为三个层次:从背景图像中检测运动目标区域;对检测区域的像素进行降噪,提取有意义的目标及其特征(目标面积、区域中心点等)。在本文中;背景减法技术用于从背景图像中分割移动物体,能够进行像素级处理。形态学操作(侵蚀和扩张)用于去除像素间的噪声。最后,利用CCL算法将前景像素划分为有意义的连通区域及其特征。
{"title":"Method of Moving Region Detection for Static Camera","authors":"P. Goel, P. Kotak, A. Gupta","doi":"10.24297/IJCT.V12I6.3142","DOIUrl":"https://doi.org/10.24297/IJCT.V12I6.3142","url":null,"abstract":"The moving object detection from a stationary video sequence is a primary task in various computer vision applications. In this proposed system; three processing levels are suppose to perform: detects moving objects region from the background image; reduce noise from the pixels of detected region and extract meaningful objects and their features (area of object, center point of area etc.). In this paper; background subtraction techniques is used for segments moving objects from the background image, which is capable for pixel level processing. Morphology operation (Erosion and dilation) are used to remove pixel to pixel noise. In last level, CCL algorithm is used for sorts out foregrounds pixels are grouped into meaningful connected regions and their features.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP 采用安全OTP的RSA、AES和Blowfish数据加密混合机制增强云安全性
Pub Date : 2018-11-06 DOI: 10.24297/IJCT.V18I0.7898
Gurjeet Singh, M. Garg
Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determined to reduce computing costs and for that reason most of them started using it in IT technology then adapted virtualization technology. Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using md5 encrypted OTP and enhanced the security of data using Cloud Broker and RSA, Blowfish and AES.  When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES,RSA and blowfish encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.
云计算已经成为最近谈论最多的技术之一,并且因为它提供了大量的机会而得到了媒体和分析师的广泛关注。企业已经决定降低计算成本,因此大多数企业开始在it技术中使用它,然后采用虚拟化技术。云计算彻底改变了按需向客户交付计算和软件服务的方式。它为用户提供了连接到计算资源和访问It托管服务的能力,这是以前未知的轻松程度。因此,云用户对安全的担忧已经成为云计算广泛发展的主要障碍。在这项研究工作中,我们使用了三步安全机制来保证云上数据的安全。我们使用md5加密的OTP实现了强认证机制,并使用Cloud Broker和RSA、Blowfish和AES增强了数据的安全性。当您登录到您的机器,然后尝试访问资源(例如文件服务器或数据库)时,需要确保您的用户名和密码有效。由于敏感数据存储在不同用户的云中,我们需要一个强大的身份验证机制以及OTP。由于没有/弱身份验证导致的数据泄露。之后,我们使用SHA2验证了存储在云提供商的数据的完整性。对处理时间、处理成本、AES、RSA和河豚加密时间、OTP生成和加密时间等多个参数进行了计算和分析。我们已经能够通过优化处理时间和处理成本来提高安全性。在实施了所提出的方法之后,总结出可以通过应用所提出的机制来增强云安全。该系统降低了系统的复杂性和处理成本,提高了系统的整体效率。
{"title":"Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP","authors":"Gurjeet Singh, M. Garg","doi":"10.24297/IJCT.V18I0.7898","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7898","url":null,"abstract":"Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determined to reduce computing costs and for that reason most of them started using it in IT technology then adapted virtualization technology. Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using md5 encrypted OTP and enhanced the security of data using Cloud Broker and RSA, Blowfish and AES.  When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES,RSA and blowfish encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face Detection & Recognition using Tensor Flow: A Review 基于张量流的人脸检测与识别综述
Pub Date : 2018-11-06 DOI: 10.24297/IJCT.V18I0.7924
Isha Chawla
Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.
由于对安全性需求的增加以及移动设备的快速发展,人脸识别已成为近年来研究的热门课题。人脸识别可以应用于访问控制、身份验证、安全系统、监控系统和社交媒体网络等许多应用。门禁包括办公室、电脑、电话、自动取款机等。目前,这些表格中的大多数都没有使用面部识别作为标准的入境方式,但随着计算机技术的进步以及更精细的算法,面部识别正在取代密码和指纹扫描仪。自9/11事件以来,人们更加关注发展安全系统,以确保无辜公民的安全。也就是说,在机场和边境口岸等需要身份验证的地方,人脸识别系统有可能降低风险,并最终防止未来发生攻击。至于监视系统,如果有罪犯在逃,也可以提出同样的观点。具有面部识别功能的监控摄像头可以帮助找到这些人。另外,这些监控系统也可以帮助确定失踪人员的下落,尽管这取决于强大的面部识别算法以及完全开发的面部数据库。最后,面部识别已经出现在Facebook等社交媒体应用程序中,这些应用程序建议用户标记在照片中识别出的朋友。很明显,面部识别系统有很多应用。一般来说,实现这一目标的步骤如下:人脸检测,特征提取,最后训练模型。
{"title":"Face Detection & Recognition using Tensor Flow: A Review","authors":"Isha Chawla","doi":"10.24297/IJCT.V18I0.7924","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7924","url":null,"abstract":"Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compared Between Ipv6 And With Ipv4,Differences And Similarities Ipv6与Ipv4的比较,异同
Pub Date : 2018-10-29 DOI: 10.24297/IJCT.V17I2.7805
Z. Z. abousalem, M. A. Ashabrawy
This paperprovides Advantages of using IPv6 andcomparison of IPv4 and IPv6,For that, it’s critical to understand the differences and similarities, Some points in the near future when the sheer size of billions new devices will throw the IPv6 switch.IPv4 and IPv6, where IPv6 is the enhanced version of IPv4, There are various differences between IPv4 and IPv6 protocol including its features, but the critical one is the number of addresses (Address space) it creates. In my paper, I will explained the main Advantages (differences between both protocols)of IPv6 & IPv4, By giving results that can be obtained through the diffusion of technology.
本文提供了使用IPv6的优势以及IPv4和IPv6的比较,因此,了解差异和相似之处至关重要,在不久的将来,当数十亿新设备的绝对规模将打开IPv6开关时。IPv4和IPv6,其中IPv6是IPv4的增强版本,IPv4和IPv6协议有很多不同之处,包括其特性,但最关键的是它创建的地址数量(地址空间)。在我的论文中,我将解释IPv6和IPv4的主要优势(两种协议之间的差异),通过给出可以通过技术扩散获得的结果。
{"title":"Compared Between Ipv6 And With Ipv4,Differences And Similarities","authors":"Z. Z. abousalem, M. A. Ashabrawy","doi":"10.24297/IJCT.V17I2.7805","DOIUrl":"https://doi.org/10.24297/IJCT.V17I2.7805","url":null,"abstract":"This paperprovides Advantages of using IPv6 andcomparison of IPv4 and IPv6,For that, it’s critical to understand the differences and similarities, Some points in the near future when the sheer size of billions new devices will throw the IPv6 switch.IPv4 and IPv6, where IPv6 is the enhanced version of IPv4, There are various differences between IPv4 and IPv6 protocol including its features, but the critical one is the number of addresses (Address space) it creates. In my paper, I will explained the main Advantages (differences between both protocols)of IPv6 & IPv4, By giving results that can be obtained through the diffusion of technology.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1