Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436036
A. Gholami, Mostafa Ghobaei Arani
In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.
{"title":"A trust model for resource selection in cloud computing environment","authors":"A. Gholami, Mostafa Ghobaei Arani","doi":"10.1109/KBEI.2015.7436036","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436036","url":null,"abstract":"In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436197
S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan
Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.
{"title":"Investigating NFC technology from the perspective of security, analysis of attacks and existing risk","authors":"S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan","doi":"10.1109/KBEI.2015.7436197","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436197","url":null,"abstract":"Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436217
Z. Kashani, A. Nabavi
This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.
{"title":"A low-phase-noise millimeter wave quadrature VCO in 180nm CMOS process","authors":"Z. Kashani, A. Nabavi","doi":"10.1109/KBEI.2015.7436217","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436217","url":null,"abstract":"This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436203
Fariba Younes Nia, M. Khalili
Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.
{"title":"An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures","authors":"Fariba Younes Nia, M. Khalili","doi":"10.1109/KBEI.2015.7436203","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436203","url":null,"abstract":"Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127852605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436153
M. Hoseini, M. N. Shahraki, Behzad Soleimani Neysiani
Association Rule Mining is concerned with the search for relationships between item-sets based on co-occurrence of patterns. Since transactional databases are being updated all the time and there are always data being added or deleted, so Incremental Association Rule Mining is very importance. Many methods have been presented so far for incremental frequent patterns mining, one of these methods is the frequent patterns mining base on the CanTree (CANonical-order TREE). Related works on CanTree, didn't discuss about extraction of frequent patterns from the tree and it has only been suggested that the mining method would be similar to FP-growth. In this paper, a new method is presented for mining CanTree, and it is evaluated to show its improvement over the FP-growth method that mine FP tree. The evaluation results have demonstrated that performance of the presented algorithm is better than the FP-growth algorithm at high minimum support thresholds and for future work can try to improve it for lower minimum support threshold.
{"title":"A new algorithm for mining frequent patterns in Can Tree","authors":"M. Hoseini, M. N. Shahraki, Behzad Soleimani Neysiani","doi":"10.1109/KBEI.2015.7436153","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436153","url":null,"abstract":"Association Rule Mining is concerned with the search for relationships between item-sets based on co-occurrence of patterns. Since transactional databases are being updated all the time and there are always data being added or deleted, so Incremental Association Rule Mining is very importance. Many methods have been presented so far for incremental frequent patterns mining, one of these methods is the frequent patterns mining base on the CanTree (CANonical-order TREE). Related works on CanTree, didn't discuss about extraction of frequent patterns from the tree and it has only been suggested that the mining method would be similar to FP-growth. In this paper, a new method is presented for mining CanTree, and it is evaluated to show its improvement over the FP-growth method that mine FP tree. The evaluation results have demonstrated that performance of the presented algorithm is better than the FP-growth algorithm at high minimum support thresholds and for future work can try to improve it for lower minimum support threshold.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123030092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436171
Zahra Shojaeerad, Saloomeh Taherifard, S. M. Jameii
At the present study, in order to ease analysis of real time data and to ease sharing data, combination of wireless sensor network and cloud computing has been applied. In addition, in order to be able to support large amount of data and in order to meet limitations of wireless sensor networks in regard with ability to process and acceleration of communications, cloud computing would be applied. Here, functions of integration of the two technologies of wireless sensor network and cloud computing would be referred and types of clouds, functions, their properties and threats of cloud computing would be also discussed.
{"title":"Combining wireless sensor networks and cloud computing: Security perspective","authors":"Zahra Shojaeerad, Saloomeh Taherifard, S. M. Jameii","doi":"10.1109/KBEI.2015.7436171","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436171","url":null,"abstract":"At the present study, in order to ease analysis of real time data and to ease sharing data, combination of wireless sensor network and cloud computing has been applied. In addition, in order to be able to support large amount of data and in order to meet limitations of wireless sensor networks in regard with ability to process and acceleration of communications, cloud computing would be applied. Here, functions of integration of the two technologies of wireless sensor network and cloud computing would be referred and types of clouds, functions, their properties and threats of cloud computing would be also discussed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436194
M. Hossein Ahmadzadegan, Ali-asghar Khorshidvand, Mehrdad Pezeshki
Secure login by passwords in the sites and applications has always been a major concern by users. Meanwhile, many spywares like Keylogger have been developed that can record the users' input characters and then have access to their passwords. In this method, a capability has been created in which Keylogger Software cannot login the user system as they record input characters. The method is in the way that one-time passwords (OTP) are generated for the users utilizing the Logistic Map Chaos Function; these passwords are expired after being used by the user and they are not valid any more. An Android Software was used to generate one-time passwords. The user generates the one-time password by installing this Android Software on his/her smart phone and enters the password into the computer without any concern of the Keylogger. The results demonstrate the success for this method.
{"title":"A method for securing username and password against the Keylogger software using the logistic map chaos function","authors":"M. Hossein Ahmadzadegan, Ali-asghar Khorshidvand, Mehrdad Pezeshki","doi":"10.1109/KBEI.2015.7436194","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436194","url":null,"abstract":"Secure login by passwords in the sites and applications has always been a major concern by users. Meanwhile, many spywares like Keylogger have been developed that can record the users' input characters and then have access to their passwords. In this method, a capability has been created in which Keylogger Software cannot login the user system as they record input characters. The method is in the way that one-time passwords (OTP) are generated for the users utilizing the Logistic Map Chaos Function; these passwords are expired after being used by the user and they are not valid any more. An Android Software was used to generate one-time passwords. The user generates the one-time password by installing this Android Software on his/her smart phone and enters the password into the computer without any concern of the Keylogger. The results demonstrate the success for this method.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128739275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436221
S. Khakpour, D. Mirabbasi
This paper present automatic generation control (AGC) of interconnected two equal area thermal system with reheat turbine in deregulated environment and using PIDD controller that compared with other classical controllers. With existence of Electrical industry deregulation, the AGC system has been considered by taking the effect of bilateral contracts into account; it means that any distribution companies (DISCO) may have contracts with any generation companies (GENCO) in other areas. The goal is to improve system parameters such as frequency deviation error, area control error and line transmitted power using above - mentioned controllers. The simulation in MATLAB/Simulink shows that the AGC with PIDD controller results in increased dynamic efficiency and improvement in responses.
{"title":"Performance evaluation of PIDD controller for automatic generation control in interconnected thermal system with reheat turbine in deregulated environment","authors":"S. Khakpour, D. Mirabbasi","doi":"10.1109/KBEI.2015.7436221","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436221","url":null,"abstract":"This paper present automatic generation control (AGC) of interconnected two equal area thermal system with reheat turbine in deregulated environment and using PIDD controller that compared with other classical controllers. With existence of Electrical industry deregulation, the AGC system has been considered by taking the effect of bilateral contracts into account; it means that any distribution companies (DISCO) may have contracts with any generation companies (GENCO) in other areas. The goal is to improve system parameters such as frequency deviation error, area control error and line transmitted power using above - mentioned controllers. The simulation in MATLAB/Simulink shows that the AGC with PIDD controller results in increased dynamic efficiency and improvement in responses.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436046
K. Moradyan, O. Bushehrian, R. Akbari
Service Oriented Architecture proposes a new paradigm to achieve building complex web based applications. It uses web services as building blocks in order to create a composition. Although, before composing web services to build a complex application, proper web services should be discovered. Effective web service discovery heavily depends on the algorithm used to match services and also accuracy and adequacy of information gathered from user's request. In this paper a query ontology in accordance with web service description documents based on WSDL to facilitate web service discovery proposed.
{"title":"A query ontology to facilitate web service discovery","authors":"K. Moradyan, O. Bushehrian, R. Akbari","doi":"10.1109/KBEI.2015.7436046","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436046","url":null,"abstract":"Service Oriented Architecture proposes a new paradigm to achieve building complex web based applications. It uses web services as building blocks in order to create a composition. Although, before composing web services to build a complex application, proper web services should be discovered. Effective web service discovery heavily depends on the algorithm used to match services and also accuracy and adequacy of information gathered from user's request. In this paper a query ontology in accordance with web service description documents based on WSDL to facilitate web service discovery proposed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436078
Kobra Amiri Zirtol, Mahnaz Noroozi, Ziba Eslami
Searchable encryption is a cryptographic primitive that enables searching over encrypted data. Think over an organization that has outsourced its encrypted database. Consider the scenario in which each member of this organization can add encrypted data to the database but accessing the data is limited to certain predefined access structure. That is, only the members of authorized subsets of members can collaborate to search for a desired data and then decrypt the received ciphertexts. In this paper, we construct a scheme that enables such a scenario and supports general access structure.
{"title":"Multi-user searchable encryption scheme with general access structure","authors":"Kobra Amiri Zirtol, Mahnaz Noroozi, Ziba Eslami","doi":"10.1109/KBEI.2015.7436078","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436078","url":null,"abstract":"Searchable encryption is a cryptographic primitive that enables searching over encrypted data. Think over an organization that has outsourced its encrypted database. Consider the scenario in which each member of this organization can add encrypted data to the database but accessing the data is limited to certain predefined access structure. That is, only the members of authorized subsets of members can collaborate to search for a desired data and then decrypt the received ciphertexts. In this paper, we construct a scheme that enables such a scenario and supports general access structure.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}