首页 > 最新文献

2011 World Congress on Information and Communication Technologies最新文献

英文 中文
Predicting execution time of machine learning tasks using metalearning 使用元学习预测机器学习任务的执行时间
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141418
R. Priya, Bruno Feres de Souza, A. L. Rossi, A. D. de Carvalho
Lately, many academic and industrial fields have shifted research focus from data acquisition to data analysis. This transition has been facilitated by the usage of Machine Learning (ML) techniques to automatically identify patterns and extract non-trivial knowledge from data. The experimental procedures associated with that are usually complex and computationally demanding. Scheduling is a typical method used to decide how to allocate tasks into available resources. An important step for such is to guess how long an application would take to execute. In this paper, we introduce an approach for predicting processing time specifically of ML tasks. It employs a metalearning framework to relate characteristics of datasets and current machine state to actual execution time. An empirical study was conducted using 78 publicly available datasets, 6 ML algorithms and 4 meta-regressors. Experimental results show that our approach outperforms a commonly used baseline method. Statistical tests advise using SVMr as meta-regressor. These achievements indicate the potential of metalearning to tackle the problem and encourage further developments.
近年来,许多学术和工业领域的研究重点已从数据采集转向数据分析。通过使用机器学习(ML)技术来自动识别模式并从数据中提取重要知识,促进了这种转变。与此相关的实验程序通常是复杂的,计算要求很高。调度是一种用于决定如何将任务分配到可用资源中的典型方法。其中一个重要的步骤是猜测应用程序执行所需的时间。本文介绍了一种预测机器学习任务处理时间的方法。它使用元学习框架将数据集的特征和当前机器状态与实际执行时间联系起来。使用78个公开可用的数据集,6个ML算法和4个元回归进行了实证研究。实验结果表明,该方法优于常用的基线方法。统计测试建议使用svm作为元回归因子。这些成就表明了元学习在解决问题和鼓励进一步发展方面的潜力。
{"title":"Predicting execution time of machine learning tasks using metalearning","authors":"R. Priya, Bruno Feres de Souza, A. L. Rossi, A. D. de Carvalho","doi":"10.1109/WICT.2011.6141418","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141418","url":null,"abstract":"Lately, many academic and industrial fields have shifted research focus from data acquisition to data analysis. This transition has been facilitated by the usage of Machine Learning (ML) techniques to automatically identify patterns and extract non-trivial knowledge from data. The experimental procedures associated with that are usually complex and computationally demanding. Scheduling is a typical method used to decide how to allocate tasks into available resources. An important step for such is to guess how long an application would take to execute. In this paper, we introduce an approach for predicting processing time specifically of ML tasks. It employs a metalearning framework to relate characteristics of datasets and current machine state to actual execution time. An empirical study was conducted using 78 publicly available datasets, 6 ML algorithms and 4 meta-regressors. Experimental results show that our approach outperforms a commonly used baseline method. Statistical tests advise using SVMr as meta-regressor. These achievements indicate the potential of metalearning to tackle the problem and encourage further developments.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Dimensionality reduction using genetic algorithm and fuzzy-rough concepts 使用遗传算法和模糊粗糙概念进行降维
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141276
M. Saha, J. Sil
Real-world datasets are often vague and redundant, creating problem to take decision accurately. Very recently, Rough-set theory has been used successfully for dimensionality reduction but is applicable only on discrete dataset. Discretisation of data leads to information loss and may add inconsistency in the datasets. The paper aims at developing an algorithm using fuzzy-rough concept to overcome this situation. By this approach, dimensionality of the dataset has been reduced and using genetic algorithm, an optimal subset of attributes is obtained, sufficient to classify the objects. The proposed algorithm reduces dimensionality to a great extent without degrading the accuracy of classification and avoid of being trapped at local minima. Results are compared with the existing algorithms demonstrate compatible outcome.
现实世界的数据集通常是模糊和冗余的,这给准确决策带来了问题。最近,粗糙集理论已成功地用于降维,但仅适用于离散数据集。数据的离散化会导致信息丢失,并可能增加数据集的不一致性。本文旨在开发一种利用模糊粗糙概念的算法来克服这种情况。该方法对数据集进行降维处理,并利用遗传算法得到最优属性子集,足以对目标进行分类。该算法在不影响分类精度和避免陷入局部极小值的情况下,在很大程度上降低了维数。结果与现有算法进行了比较,验证了相容的结果。
{"title":"Dimensionality reduction using genetic algorithm and fuzzy-rough concepts","authors":"M. Saha, J. Sil","doi":"10.1109/WICT.2011.6141276","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141276","url":null,"abstract":"Real-world datasets are often vague and redundant, creating problem to take decision accurately. Very recently, Rough-set theory has been used successfully for dimensionality reduction but is applicable only on discrete dataset. Discretisation of data leads to information loss and may add inconsistency in the datasets. The paper aims at developing an algorithm using fuzzy-rough concept to overcome this situation. By this approach, dimensionality of the dataset has been reduced and using genetic algorithm, an optimal subset of attributes is obtained, sufficient to classify the objects. The proposed algorithm reduces dimensionality to a great extent without degrading the accuracy of classification and avoid of being trapped at local minima. Results are compared with the existing algorithms demonstrate compatible outcome.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Edge detection using adaptive thresholding and Ant Colony Optimization 基于自适应阈值和蚁群优化的边缘检测
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141264
O. Verma, Prerna Singhal, Sakshi Garg, D. S. Chauhan
In this paper, we present an approach for edge detection using adaptive thresholding and Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Initially, the edge map of the image is obtained using adaptive thresholding. The end points obtained using adaptive threshoding are calculated and the ants are placed at these points. The movement of the ants is guided by the local variation in the pixel intensity values. The probability factor of only undetected neighboring pixels is taken into consideration while moving an ant to the next probable edge pixel. The two stopping rules are implemented to prevent the movement of ants through the pixel already detected using the adoptive thresholding. The results are qualitative analyze using Shanon's Entropy function.
在本文中,我们提出了一种利用自适应阈值和蚁群优化(ACO)算法进行边缘检测的方法,以获得良好连接的图像边缘映射。首先,采用自适应阈值法获得图像的边缘映射。计算自适应阈值法得到的端点,并将蚁群放置在这些端点上。蚂蚁的运动是由像素强度值的局部变化来引导的。在将蚂蚁移动到下一个可能的边缘像素时,考虑了仅未检测到相邻像素的概率因子。这两个停止规则是为了防止蚂蚁通过使用自适应阈值检测到的像素移动。利用香农熵函数对结果进行定性分析。
{"title":"Edge detection using adaptive thresholding and Ant Colony Optimization","authors":"O. Verma, Prerna Singhal, Sakshi Garg, D. S. Chauhan","doi":"10.1109/WICT.2011.6141264","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141264","url":null,"abstract":"In this paper, we present an approach for edge detection using adaptive thresholding and Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Initially, the edge map of the image is obtained using adaptive thresholding. The end points obtained using adaptive threshoding are calculated and the ants are placed at these points. The movement of the ants is guided by the local variation in the pixel intensity values. The probability factor of only undetected neighboring pixels is taken into consideration while moving an ant to the next probable edge pixel. The two stopping rules are implemented to prevent the movement of ants through the pixel already detected using the adoptive thresholding. The results are qualitative analyze using Shanon's Entropy function.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114438800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Optimal placement of phasor measurement units against PMU outage and Line outage Using advanced particle swarm optimization techniques 采用先进的粒子群优化技术对PMU停机和线路停机情况下相量测量单元的优化配置
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141296
V. B. Raju, T. TejaSwaroop, R. K. Rao
In this paper, a model for the optimal placement of contingency-constrained phasor measurement units (PMUs) in electric power networks is presented. The study of placement of PMU's for different contingency conditions in power networks including measurement losses and line outages are studied. The communication constraints which would limit the maximum number of measurements associated with each installed PMU is considered as measurement limitations. The IEEE standard test systems are examined for the applicability of proposed model. The comparison of presented results with those of other methods is presented which would justify the effectiveness of proposed model with regards to minimizing the total number of PMUs and the execution time. The proposed method uses Advanced Particle Swarm Optimization technique for optimal placement of PMU's. The simulation results are reported for two systems (IEEE-14 bus & IEEE-39 bus systems)
本文提出了电网中约束相量测量单元(pmu)的优化配置模型。研究了在电网中测量损耗和线路中断等不同突发情况下PMU的配置问题。通信约束将限制与每个安装的PMU相关联的最大测量数量,这被认为是测量限制。通过对IEEE标准测试系统的测试,验证了所提出模型的适用性。将所提出的模型与其他方法的结果进行了比较,证明了所提出模型在最小化pmu总数和执行时间方面的有效性。该方法采用先进的粒子群优化技术对PMU进行优化布置。给出了两种系统(IEEE-14总线和IEEE-39总线系统)的仿真结果。
{"title":"Optimal placement of phasor measurement units against PMU outage and Line outage Using advanced particle swarm optimization techniques","authors":"V. B. Raju, T. TejaSwaroop, R. K. Rao","doi":"10.1109/WICT.2011.6141296","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141296","url":null,"abstract":"In this paper, a model for the optimal placement of contingency-constrained phasor measurement units (PMUs) in electric power networks is presented. The study of placement of PMU's for different contingency conditions in power networks including measurement losses and line outages are studied. The communication constraints which would limit the maximum number of measurements associated with each installed PMU is considered as measurement limitations. The IEEE standard test systems are examined for the applicability of proposed model. The comparison of presented results with those of other methods is presented which would justify the effectiveness of proposed model with regards to minimizing the total number of PMUs and the execution time. The proposed method uses Advanced Particle Swarm Optimization technique for optimal placement of PMU's. The simulation results are reported for two systems (IEEE-14 bus & IEEE-39 bus systems)","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An interference graph based MAC protocol for multi rate ad hoc networks 一种基于干扰图的多速率自组网MAC协议
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141310
S. Varma, V. Tokekar
Prior works on the hidden terminal problem in wireless networks often assume that the SNR requirement and the transmission range in a networks are fixed. In fact they are rate dependent. Because of this assumption many of the prior conclusions about the hidden terminal are not accurate. A new analysis of the hidden terminal problem is presented in the paper. The new insights provided by the analysis lead to a IG-MAC scheme for tackling the hidden terminal problem in multi rate ad hoc networks. The key point is to model the interference information by means of Interference Graph and send busy tone with encoded communication information to prevent the potentially interfering nodes from initiating new transmissions. Through the simulations our protocol can solve the hidden terminals problem caused by 802.11 and improve the network performance substantially.
以往研究无线网络隐终端问题的工作通常假设网络的信噪比要求和传输范围是固定的。事实上,它们是速率相关的。由于这种假设,许多先前关于隐藏终端的结论是不准确的。本文对隐终端问题进行了新的分析。分析提供的新见解导致了解决多速率自组织网络中隐藏终端问题的IG-MAC方案。关键是利用干扰图对干扰信息进行建模,用编码后的通信信息发送忙音,防止潜在的干扰节点发起新的传输。仿真结果表明,该协议解决了802.11带来的终端隐藏问题,大大提高了网络性能。
{"title":"An interference graph based MAC protocol for multi rate ad hoc networks","authors":"S. Varma, V. Tokekar","doi":"10.1109/WICT.2011.6141310","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141310","url":null,"abstract":"Prior works on the hidden terminal problem in wireless networks often assume that the SNR requirement and the transmission range in a networks are fixed. In fact they are rate dependent. Because of this assumption many of the prior conclusions about the hidden terminal are not accurate. A new analysis of the hidden terminal problem is presented in the paper. The new insights provided by the analysis lead to a IG-MAC scheme for tackling the hidden terminal problem in multi rate ad hoc networks. The key point is to model the interference information by means of Interference Graph and send busy tone with encoded communication information to prevent the potentially interfering nodes from initiating new transmissions. Through the simulations our protocol can solve the hidden terminals problem caused by 802.11 and improve the network performance substantially.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy and power issues in Network-on Chip 片上网络中的能源和电力问题
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141441
M. Sharma, M. Ayoub Khan
The Network-on-Chip (NoC) has emerged as an essential infrastructure for design of any complex System-on-Chip. The NoC provides efficient technique to exchange the data between different domains of Intellectual property (IP) cores. This also provides paradigm for integrating large number Intellectual Property (IP). Due to ever increasing integration of IPs the need of Network-on-Chip for efficient communication is essential. The power associated with the NoC is to be dealt because majority of the power is dissipated due to interconnection. In this paper we have investigated various levels where power can be reduced. This paper also presents mathematical model that can be applied to reduce the power.
片上网络(NoC)已经成为设计任何复杂片上系统的基本基础设施。NoC为不同知识产权(IP)核域之间的数据交换提供了有效的技术。这也为大量知识产权(IP)的整合提供了范例。由于ip的集成度不断提高,对片上网络的高效通信的需求是必不可少的。与NoC相关的功率将被处理,因为大部分功率由于互连而耗散。在本文中,我们研究了可以降低功率的各种级别。本文还提出了可用于降低功率的数学模型。
{"title":"Energy and power issues in Network-on Chip","authors":"M. Sharma, M. Ayoub Khan","doi":"10.1109/WICT.2011.6141441","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141441","url":null,"abstract":"The Network-on-Chip (NoC) has emerged as an essential infrastructure for design of any complex System-on-Chip. The NoC provides efficient technique to exchange the data between different domains of Intellectual property (IP) cores. This also provides paradigm for integrating large number Intellectual Property (IP). Due to ever increasing integration of IPs the need of Network-on-Chip for efficient communication is essential. The power associated with the NoC is to be dealt because majority of the power is dissipated due to interconnection. In this paper we have investigated various levels where power can be reduced. This paper also presents mathematical model that can be applied to reduce the power.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122154081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Magnetic Resonant Image segmentation using trained K-means clustering 基于训练k均值聚类的磁共振图像分割
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141301
A. Kumbhar, A. Kulkarni
Magnetic Resonant Image segmentation is an indispensable process in the visualization of human tissues, particularly during clinical analysis. In this paper, we describe a method for segmentation of White matter and Gray matter from real MR images using a LM-k-means technique. After preprocessing, a simple unsupervised clustering system like k-means is taken and made into a supervised system by using Levenberg-Marquardt optimization technique. It was inferred that a k-means system does not arrive on its own at the means which will give a good segmentation. Hence the LM algorithm trains it for that purpose. The results are compared with that of a k-means system and they show a considerable improvement with a much higher precision.
磁共振图像分割是人体组织可视化中不可缺少的一个过程,尤其是在临床分析中。在本文中,我们描述了一种使用LM-k-means技术从真实MR图像中分割白质和灰质的方法。将k-means等简单的无监督聚类系统预处理后,利用Levenberg-Marquardt优化技术将其转化为监督系统。由此推断,k-means系统不会自行到达均值,这将给出一个很好的分割。因此,LM算法为此目的训练它。将结果与k-means系统的结果进行了比较,结果显示出了相当大的改进,精度更高。
{"title":"Magnetic Resonant Image segmentation using trained K-means clustering","authors":"A. Kumbhar, A. Kulkarni","doi":"10.1109/WICT.2011.6141301","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141301","url":null,"abstract":"Magnetic Resonant Image segmentation is an indispensable process in the visualization of human tissues, particularly during clinical analysis. In this paper, we describe a method for segmentation of White matter and Gray matter from real MR images using a LM-k-means technique. After preprocessing, a simple unsupervised clustering system like k-means is taken and made into a supervised system by using Levenberg-Marquardt optimization technique. It was inferred that a k-means system does not arrive on its own at the means which will give a good segmentation. Hence the LM algorithm trains it for that purpose. The results are compared with that of a k-means system and they show a considerable improvement with a much higher precision.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-time object detection and tracking in an unknown environment 在未知环境下的实时目标检测和跟踪
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141394
S. Prasad, S. Sinha
In several applications of computer vision and image processing, the inception of the processing starts with object detection and subsequently tracking, if the need arises. In recent years, there has been extensive research in the field of object detection and tracking. Many remarkable algorithms have been developed for object detection and tracking, including color segmentation, edge tracking and many more. However, all these algorithms faced the limited success in their implementation in the real world and were also bounded by the constraints such as white/plain background. This paper is the result of our research where our research team developed and implemented object detection and tracking system operational in an unknown background, using real-time video processing and a single camera. The proposed system has been extensively tested to operate in complex, real world, non-plain, light variant, changing background.
在计算机视觉和图像处理的几个应用中,处理的开始是从对象检测开始的,如果需要,随后进行跟踪。近年来,在目标检测与跟踪领域得到了广泛的研究。许多引人注目的算法已经开发用于目标检测和跟踪,包括颜色分割,边缘跟踪等等。然而,这些算法在现实世界中的实现都面临着有限的成功,并且还受到白色/普通背景等约束的限制。本文是我们的研究成果,我们的研究团队开发并实现了在未知背景下运行的目标检测和跟踪系统,使用实时视频处理和单摄像头。该系统已经过广泛的测试,可在复杂、真实世界、非平面、光变体和变化背景下运行。
{"title":"Real-time object detection and tracking in an unknown environment","authors":"S. Prasad, S. Sinha","doi":"10.1109/WICT.2011.6141394","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141394","url":null,"abstract":"In several applications of computer vision and image processing, the inception of the processing starts with object detection and subsequently tracking, if the need arises. In recent years, there has been extensive research in the field of object detection and tracking. Many remarkable algorithms have been developed for object detection and tracking, including color segmentation, edge tracking and many more. However, all these algorithms faced the limited success in their implementation in the real world and were also bounded by the constraints such as white/plain background. This paper is the result of our research where our research team developed and implemented object detection and tracking system operational in an unknown background, using real-time video processing and a single camera. The proposed system has been extensively tested to operate in complex, real world, non-plain, light variant, changing background.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Mitigating the authentication vulnerabilities in Web applications through security requirements 通过安全需求减轻Web应用程序中的身份验证漏洞
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141435
R. Kumar
To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.
为了设计和实现安全的web应用程序,分析必须从了解应用程序将面临的风险开始。以业务为中心的Web应用程序需要复杂的身份验证策略来安全地实现业务流程。对应用程序存储、处理和传输的数据的机密性、可用性和完整性的威胁需要与保护它们的策略、技术和人为因素相匹配。本文的目标是通过揭示与身份验证过程和安全需求相关的常见缺陷,提供对web应用程序安全开发的深入了解,这些缺陷将确保应用程序能够抵御这些攻击。
{"title":"Mitigating the authentication vulnerabilities in Web applications through security requirements","authors":"R. Kumar","doi":"10.1109/WICT.2011.6141435","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141435","url":null,"abstract":"To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched against the policies, technologies and human factors that would protect them. The goal of this paper is to provide an insight into the secure development of web applications by exposing the pitfalls often encountered related to the authentication process and to security requirements that will ensure application is resilient to these attacks.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Double hash function scheme in wireless sensor networks 无线传感器网络中的双哈希函数方案
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141223
T. Subash, C. Divya
Wireless sensor networks are a new class of distributed systems that are an integral part of the physical space they inhabit. Key distribution plays an important role in wireless sensor networks. In WSN, node capture attack is the most series attack. The aim of this paper is to improve the resistance against the node capture attack. So a double hash function key pre-distribution scheme is used to stop an adversary to get information of non-compromised sensor nodes from the compromised sensor nodes and the deployment model, is based on hexagonal to improve the local connectivity. The proposed scheme provides the best resilience against sensor nodes capture and the probability of links between any sensor nodes are compromised is zero after pair wise keys establishment.
无线传感器网络是一种新型的分布式系统,是它们所处物理空间的一个组成部分。密钥分配在无线传感器网络中起着重要的作用。在无线传感器网络中,节点捕获攻击是最常见的攻击。本文的目的是提高对节点捕获攻击的抵抗力。因此,采用双哈希函数密钥预分发方案阻止攻击者从被入侵传感器节点获取未被入侵传感器节点的信息,并采用基于六边形的部署模型来提高局部连通性。该方案提供了最佳的抗传感器节点捕获的弹性,并且在对密钥建立后,任何传感器节点之间的链路被破坏的概率为零。
{"title":"Double hash function scheme in wireless sensor networks","authors":"T. Subash, C. Divya","doi":"10.1109/WICT.2011.6141223","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141223","url":null,"abstract":"Wireless sensor networks are a new class of distributed systems that are an integral part of the physical space they inhabit. Key distribution plays an important role in wireless sensor networks. In WSN, node capture attack is the most series attack. The aim of this paper is to improve the resistance against the node capture attack. So a double hash function key pre-distribution scheme is used to stop an adversary to get information of non-compromised sensor nodes from the compromised sensor nodes and the deployment model, is based on hexagonal to improve the local connectivity. The proposed scheme provides the best resilience against sensor nodes capture and the probability of links between any sensor nodes are compromised is zero after pair wise keys establishment.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2011 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1