首页 > 最新文献

2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)最新文献

英文 中文
High security data hiding using image cropping and LSB least significant bit steganography 利用图像裁剪和LSB最低有效位隐写技术实现高安全性数据隐藏
Khalid A. Al-Afandy, El-Sayed M. El-Rabaie, O. Faragallah, Ahmed Elmhalawy, Ghada M. El-Banby
A high security data hiding approach using image cropping and Least Significant Bit (LSB) steganography is proposed. The predefined certain secret coordinate crops are extracted from the cover image. The secret text message is divided into parts with the same image crops. Each part of the secret text message is embedded into an image crop with secret sequence using LSB approach. The embedding is done using the cover image of three color channels. The stego image is given by reassembling the image and the stego crops. A detailed comparative study is performed between the proposed approach and the other state-of-the-art approaches. This comparison is based on visualization to detect any degradation in stego image, difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio (PSNR) of stego image, and the embedding algorithm CPU time. Experimental results shows that the proposed approach is more secure compared with the other traditional approaches.
提出了一种基于图像裁剪和LSB隐写技术的高安全性数据隐藏方法。从覆盖图像中提取预定义的某些秘密坐标作物。秘密文本信息被分成具有相同图像作物的部分。利用LSB方法将秘密文本信息的每个部分嵌入到具有秘密序列的图像裁剪中。使用三种颜色通道的封面图像进行嵌入。通过对图像和隐编码作物进行重组,得到隐编码图像。在提出的方法和其他最先进的方法之间进行了详细的比较研究。这种比较是基于可视化来检测隐藏图像的任何退化,未经授权的观察者提取嵌入数据的难度,隐藏图像的峰值信噪比(PSNR),以及嵌入算法的CPU时间。实验结果表明,与其他传统方法相比,该方法具有更高的安全性。
{"title":"High security data hiding using image cropping and LSB least significant bit steganography","authors":"Khalid A. Al-Afandy, El-Sayed M. El-Rabaie, O. Faragallah, Ahmed Elmhalawy, Ghada M. El-Banby","doi":"10.1109/CIST.2016.7805079","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805079","url":null,"abstract":"A high security data hiding approach using image cropping and Least Significant Bit (LSB) steganography is proposed. The predefined certain secret coordinate crops are extracted from the cover image. The secret text message is divided into parts with the same image crops. Each part of the secret text message is embedded into an image crop with secret sequence using LSB approach. The embedding is done using the cover image of three color channels. The stego image is given by reassembling the image and the stego crops. A detailed comparative study is performed between the proposed approach and the other state-of-the-art approaches. This comparison is based on visualization to detect any degradation in stego image, difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio (PSNR) of stego image, and the embedding algorithm CPU time. Experimental results shows that the proposed approach is more secure compared with the other traditional approaches.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Solving the max-cut problem using semidefinite optimization 用半定优化方法求解最大切割问题
Derkaoui Orkia, A. Lehireche
Max-cut problem is one of many NP-hard graph theory problems which attracted many researchers over the years. Maximum cuts are useful items including theoretical physics and electronics. But they are best known for algorithmic problem of finding a maximum cutting, commonly called MAXCUT, a relatively well-studied problem, particularly in the context of the approximation. Various heuristics, or combination of optimization and heuristic methods have been developed to solve this problem. Among them is the efficient algorithm of Goemans and Williamson. Their algorithm combines Semidefinite programming and a rounding procedure to produce an approximate solution to the max-cut problem. Semidefinite Programming (SDP) is currently the most sophisticated area of Conic Programming that is polynomially solvable. The SDP problem is solved with interior point methods. In parallel, the development of efficient SDP solvers, based on interior point algorithms, also contributed to the success of this method. In this paper we use a new variant of the solver CSDP (C library for semidfinite programming) to resolve this problem. It is based on a Majorize-Minimize line search algorithm for barrier function optimization. A tangent majorant function is built to approximate a scalar criterion containing a barrier function. The comparison of the results obtained with the classic CSDP and our new variant is promising.
极大切问题是近年来备受关注的NP-hard图论问题之一。最大切割是有用的项目,包括理论物理和电子。但它们最著名的是寻找最大切割的算法问题,通常称为MAXCUT,这是一个相对较好的研究问题,特别是在近似的背景下。各种启发式方法,或优化和启发式方法的结合已经发展来解决这个问题。其中有Goemans和Williamson的高效算法。他们的算法结合了半定规划和舍入过程来产生最大切问题的近似解。半定规划(SDP)是目前多项式可解的二次规划中最复杂的领域。用内点法求解SDP问题。同时,基于内点算法的高效SDP求解器的开发也为该方法的成功做出了贡献。本文采用求解器CSDP(半定编程C库)的一个新变体来解决这一问题。它是基于最大化-最小化线搜索算法的障碍函数优化。建立了一个正切主函数来近似包含势垒函数的标量准则。与经典的CSDP和我们的新变体的结果比较是有希望的。
{"title":"Solving the max-cut problem using semidefinite optimization","authors":"Derkaoui Orkia, A. Lehireche","doi":"10.1109/CIST.2016.7804990","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804990","url":null,"abstract":"Max-cut problem is one of many NP-hard graph theory problems which attracted many researchers over the years. Maximum cuts are useful items including theoretical physics and electronics. But they are best known for algorithmic problem of finding a maximum cutting, commonly called MAXCUT, a relatively well-studied problem, particularly in the context of the approximation. Various heuristics, or combination of optimization and heuristic methods have been developed to solve this problem. Among them is the efficient algorithm of Goemans and Williamson. Their algorithm combines Semidefinite programming and a rounding procedure to produce an approximate solution to the max-cut problem. Semidefinite Programming (SDP) is currently the most sophisticated area of Conic Programming that is polynomially solvable. The SDP problem is solved with interior point methods. In parallel, the development of efficient SDP solvers, based on interior point algorithms, also contributed to the success of this method. In this paper we use a new variant of the solver CSDP (C library for semidfinite programming) to resolve this problem. It is based on a Majorize-Minimize line search algorithm for barrier function optimization. A tangent majorant function is built to approximate a scalar criterion containing a barrier function. The comparison of the results obtained with the classic CSDP and our new variant is promising.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward an efficient brain tumor extraction using level set method and pennes bioheat equation 利用水平集法和pennes生物热方程对脑肿瘤进行高效提取
Abdelmajid Bousselham, O. Bouattane, M. Youssfi, A. Raihani
The aim of this paper is to present a new approach for improving deformable models and especially the Level Set Method (LSM) for segmentation and extraction of brain tumors in MRI (Magnetic Resonance Imaging) with more accuracy, the contribution of this work is to exploit thermal behavior of brain tumors for correcting level set contours. Human Body temperature distribution is an indicator of health condition, the brain tumor cells generate more heat than normal brain cells due to their higher metabolism and their vascular dilation. Heat distribution in human body is modeled using Pennes BioHeat Transfer Equation (PBHTE) solved by Finite Volume Method (FVM), and with the inverse analysis using Genetic Algorithm (GA) we will estimate the size and location of brain tumor, with this way Level Set Method extracts tumors contours with more accuracy and efficiency. To our knowledge, this is the first approach which introduces thermal analysis to improve the accuracy of segmentation and extraction of tumors in MRI images.
本文的目的是提出一种改进可变形模型的新方法,特别是水平集方法(LSM),以提高MRI(磁共振成像)中脑肿瘤的分割和提取的准确性,这项工作的贡献是利用脑肿瘤的热行为来校正水平集轮廓。人体温度分布是健康状况的一个指标,脑肿瘤细胞比正常脑细胞产生更多的热量,因为它们的新陈代谢更快,血管扩张。利用有限体积法(FVM)求解Pennes生物传热方程(phbhte)建立人体热量分布模型,利用遗传算法(GA)进行逆分析,估计出脑肿瘤的大小和位置,从而使水平集法更准确、更高效地提取肿瘤轮廓。据我们所知,这是第一个引入热分析来提高MRI图像中肿瘤分割和提取精度的方法。
{"title":"Toward an efficient brain tumor extraction using level set method and pennes bioheat equation","authors":"Abdelmajid Bousselham, O. Bouattane, M. Youssfi, A. Raihani","doi":"10.1109/CIST.2016.7804989","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804989","url":null,"abstract":"The aim of this paper is to present a new approach for improving deformable models and especially the Level Set Method (LSM) for segmentation and extraction of brain tumors in MRI (Magnetic Resonance Imaging) with more accuracy, the contribution of this work is to exploit thermal behavior of brain tumors for correcting level set contours. Human Body temperature distribution is an indicator of health condition, the brain tumor cells generate more heat than normal brain cells due to their higher metabolism and their vascular dilation. Heat distribution in human body is modeled using Pennes BioHeat Transfer Equation (PBHTE) solved by Finite Volume Method (FVM), and with the inverse analysis using Genetic Algorithm (GA) we will estimate the size and location of brain tumor, with this way Level Set Method extracts tumors contours with more accuracy and efficiency. To our knowledge, this is the first approach which introduces thermal analysis to improve the accuracy of segmentation and extraction of tumors in MRI images.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122216417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rotated asymetrique haar features for face detection 用于人脸检测的旋转非对称特征
M. Oualla, A. Sadiq
In our previous work, we have proposed a new approach to detect rotated object at distinct angles using the ViolaJones detector. This approach consists in feeding the groups of Haar features presented by Viola & Jones, Lienhart and others by other features which are rotated by any angle. In this paper we have extended this set of features by others called normal and rotated asymmetric Haar features. To concretize our method, we test our algorithm on two databases (Umist and CMU-PIE), containing a set of faces attributed to many variations in scale, location, orientation (in-plane rotation), pose (out-of-plane rotation), facial expression, lighting conditions, occlusions, etc.
在我们之前的工作中,我们提出了一种使用ViolaJones检测器检测不同角度旋转物体的新方法。这种方法包括将Viola & Jones, Lienhart等人提出的Haar特征组添加到旋转任意角度的其他特征组中。在本文中,我们扩展了这组特征,称为正规和旋转不对称Haar特征。为了具体说明我们的方法,我们在两个数据库(Umist和CMU-PIE)上测试了我们的算法,其中包含一组在规模、位置、方向(平面内旋转)、姿势(平面外旋转)、面部表情、光照条件、遮挡等方面有许多变化的人脸。
{"title":"Rotated asymetrique haar features for face detection","authors":"M. Oualla, A. Sadiq","doi":"10.1109/CIST.2016.7805094","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805094","url":null,"abstract":"In our previous work, we have proposed a new approach to detect rotated object at distinct angles using the ViolaJones detector. This approach consists in feeding the groups of Haar features presented by Viola & Jones, Lienhart and others by other features which are rotated by any angle. In this paper we have extended this set of features by others called normal and rotated asymmetric Haar features. To concretize our method, we test our algorithm on two databases (Umist and CMU-PIE), containing a set of faces attributed to many variations in scale, location, orientation (in-plane rotation), pose (out-of-plane rotation), facial expression, lighting conditions, occlusions, etc.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic management of data warehouse security levels based on user profiles 基于用户配置文件的数据仓库安全级别动态管理
Amina El Ouazzani, Sara Rhazlane, Nouria Harbi, Hassan Badir
Respect for privacy and data confidentiality in a company are two fundamentals that must be protected. However, a Data Warehouse can be used as a very powerful mechanism for discovering crucial information, hence the importance of implementing security measures which guarantee the data confidentiality by establishing an access control policy. In this direction, several propositions were made, however, none is considered as a standard of access management to data warehouses. In this article, we will present our approach that allows first to exploit the permissions defined in the data sources in order to help the administrator to define access permissions to the data warehouse, and then our system will automatically generate the sensitivity level of each data warehouse element according to the permissions granted to an object in the data warehouse.
尊重隐私和数据保密是公司必须保护的两个基本原则。然而,数据仓库可以用作发现关键信息的非常强大的机制,因此实现安全措施(通过建立访问控制策略来保证数据机密性)非常重要。在这个方向上,提出了几个建议,但是,没有一个被认为是数据仓库访问管理的标准。在本文中,我们将介绍一种方法,该方法首先允许利用数据源中定义的权限来帮助管理员定义对数据仓库的访问权限,然后我们的系统将根据授予数据仓库中对象的权限自动生成每个数据仓库元素的敏感级别。
{"title":"Dynamic management of data warehouse security levels based on user profiles","authors":"Amina El Ouazzani, Sara Rhazlane, Nouria Harbi, Hassan Badir","doi":"10.1109/CIST.2016.7804961","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804961","url":null,"abstract":"Respect for privacy and data confidentiality in a company are two fundamentals that must be protected. However, a Data Warehouse can be used as a very powerful mechanism for discovering crucial information, hence the importance of implementing security measures which guarantee the data confidentiality by establishing an access control policy. In this direction, several propositions were made, however, none is considered as a standard of access management to data warehouses. In this article, we will present our approach that allows first to exploit the permissions defined in the data sources in order to help the administrator to define access permissions to the data warehouse, and then our system will automatically generate the sensitivity level of each data warehouse element according to the permissions granted to an object in the data warehouse.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An application of distributional semantics for the analysis of the Holy Quran 分布语义学在《古兰经》分析中的应用
Giulia Benotto, Emiliano Giovannetti, Ouafae Nahli
In this contribution we illustrate the methodology and the results of an experiment we conducted by applying Distributional Semantics Models to the analysis of the Holy Quran. Our aim was to gather information on the potential differences in meanings that the same words might take on when used in Modern Standard Arabic w.r.t. their usage in the Quran. To do so we used the Penn Arabic Treebank as a contrastive corpus.
在这篇文章中,我们阐述了将分布语义模型应用于《古兰经》分析的方法和实验结果。我们的目的是收集相同的单词在现代标准阿拉伯语中可能出现的潜在含义差异的信息,而不是它们在古兰经中的用法。为此,我们使用宾大阿拉伯语树库作为对比语料库。
{"title":"An application of distributional semantics for the analysis of the Holy Quran","authors":"Giulia Benotto, Emiliano Giovannetti, Ouafae Nahli","doi":"10.1109/CIST.2016.7805074","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805074","url":null,"abstract":"In this contribution we illustrate the methodology and the results of an experiment we conducted by applying Distributional Semantics Models to the analysis of the Holy Quran. Our aim was to gather information on the potential differences in meanings that the same words might take on when used in Modern Standard Arabic w.r.t. their usage in the Quran. To do so we used the Penn Arabic Treebank as a contrastive corpus.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classical dictionary Al-Qamus in lemon 经典词典Al-Qamus in lemon
Mustapha Khalfi, Ouafae Nahli, A. Zarghili
In order to enrich the digital content of Classical Arabic, we aim to propose and represent the Arabic dictionary “'Al-Qamiis Al-Muhit” in the standard format LEMON. Printed transition to digital format requires various steps of work. This article describes the procedures that we followed to convert the dictionary in digitized and encoded format to apply automatic extractions and get the Lemon format used in semantic web. Furthermore, due to Arabic dictionary complexity, formalize lexical and semantic information involves morphosyntactic and derivational knowledge that we try to explain.
为了丰富古典阿拉伯语的数字内容,我们的目标是提出并以柠檬标准格式表示阿拉伯语词典“Al-Qamiis Al-Muhit”。印刷到数字格式的过渡需要各种步骤的工作。本文描述了将词典数字化编码后的格式转换为自动提取,从而得到语义网中使用的Lemon格式的过程。此外,由于阿拉伯语词典的复杂性,形式化词汇和语义信息涉及我们试图解释的形态句法和衍生知识。
{"title":"Classical dictionary Al-Qamus in lemon","authors":"Mustapha Khalfi, Ouafae Nahli, A. Zarghili","doi":"10.1109/CIST.2016.7805065","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805065","url":null,"abstract":"In order to enrich the digital content of Classical Arabic, we aim to propose and represent the Arabic dictionary “'Al-Qamiis Al-Muhit” in the standard format LEMON. Printed transition to digital format requires various steps of work. This article describes the procedures that we followed to convert the dictionary in digitized and encoded format to apply automatic extractions and get the Lemon format used in semantic web. Furthermore, due to Arabic dictionary complexity, formalize lexical and semantic information involves morphosyntactic and derivational knowledge that we try to explain.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards new hybrid approach of the reverse engineering of UML sequence diagram 面向UML序列图逆向工程的新混合方法
C. Baidada, A. Jakimi
To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.
为了完全理解程序的行为,重要的是要有自动生成UML(统一建模语言)模型的技术来表示系统的行为。通过对运行的应用程序进行动态分析或对源代码进行静态分析,可以使用逆向工程技术来帮助获得这种理解。每种技术都有其局限性。动态分析的主要限制是需要了解系统不同行为的系统专家用户。静态分析也有限制,特别是动态链接和多态性状态。本文提出了一种从面向对象编程语言中自动提取UML序列图的方法。我们的方法结合了动态和静态分析,以获得两种方法的最佳效果。我们的方法使用静态分析来识别所有不同的系统条目值,这些值可以用来指导动态分析。
{"title":"Towards new hybrid approach of the reverse engineering of UML sequence diagram","authors":"C. Baidada, A. Jakimi","doi":"10.1109/CIST.2016.7805035","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805035","url":null,"abstract":"To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordination by sharing demand forecasts in a supply chain using game theoretic approach 利用博弈论方法在供应链中通过共享需求预测进行协调
Ilhame El Farissi, Ilham Slimani, S. Achchab
Through the literature, authors give a considerable attention to game theory because of its wide range of applications in various fields including economics, political science, psychology or biology. The aim of this case study is to employ game theoretic approach to model information sharing as a coordination mechanism in a basic two-echelon supply chain composed of a single retailer and a single supplier. This paper is the sequel of previous works; where demand is forecasted based on historical data of a supermarket in Morocco using the Multi Layer Perceptron structure of the artificial neural networks. Nevertheless, this work focuses on the implementation of the obtained forecasting results in the studied system modeled as a game of two players with asymmetric and imperfect information, in order to find the equilibrium of the game that guaranties maximum payoff for both players. In fact, this is what game theory is all about.
通过文献,作者对博弈论给予了相当大的关注,因为它在各个领域的广泛应用,包括经济学,政治学,心理学或生物学。本案例研究的目的是运用博弈论的方法对由单一零售商和单一供应商组成的基本两级供应链中的信息共享作为协调机制进行建模。本文是前人研究的续作;其中需求是基于摩洛哥一家超市的历史数据,使用人工神经网络的多层感知器结构来预测的。然而,本工作的重点是将所获得的预测结果在研究系统中实现为具有不对称和不完全信息的两个参与者的博弈,以找到保证双方参与者收益最大化的博弈均衡。事实上,这就是博弈论的全部内容。
{"title":"Coordination by sharing demand forecasts in a supply chain using game theoretic approach","authors":"Ilhame El Farissi, Ilham Slimani, S. Achchab","doi":"10.1109/CIST.2016.7805028","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805028","url":null,"abstract":"Through the literature, authors give a considerable attention to game theory because of its wide range of applications in various fields including economics, political science, psychology or biology. The aim of this case study is to employ game theoretic approach to model information sharing as a coordination mechanism in a basic two-echelon supply chain composed of a single retailer and a single supplier. This paper is the sequel of previous works; where demand is forecasted based on historical data of a supermarket in Morocco using the Multi Layer Perceptron structure of the artificial neural networks. Nevertheless, this work focuses on the implementation of the obtained forecasting results in the studied system modeled as a game of two players with asymmetric and imperfect information, in order to find the equilibrium of the game that guaranties maximum payoff for both players. In fact, this is what game theory is all about.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114120873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High speed efficient FPGA implementation of pipelined AES S-Box 高速高效的FPGA实现流水线AES S-Box
Soufiane Oukili, S. Bri, A. V. S. Kumar
Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.
智慧城市正在成为一个常用术语,用来描述利用信息和通信技术(ICT)增强城市服务和提高市民生活质量的概念。所有的通信都应该快速和适当地防止未经授权的窃听、拦截和修改。因此,需要高速和强密码。高级加密标准(AES)是目前应用最广泛、最安全的对称密钥加密算法。s盒替换是该算法中唯一的非线性步骤。它是系统中最复杂和最昂贵的部分之一。在本文中,我们采用组合逻辑提出了高速高效的S-box AES架构。为了提高速度和最大运行频率,我们采用了5级管道设计。因此,寄存器被插入到最佳位置。采用Xilinx ISE 14.7,采用virtex-6 (xc6vlx240t) FPGA器件成功实现。我们提出的设计实现了842.744 MHz的频率,占用了20个片,而文献中报道的最高工作频率是696.37 MHz,占用了32个片。
{"title":"High speed efficient FPGA implementation of pipelined AES S-Box","authors":"Soufiane Oukili, S. Bri, A. V. S. Kumar","doi":"10.1109/CIST.2016.7805015","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805015","url":null,"abstract":"Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1