首页 > 最新文献

The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)最新文献

英文 中文
A novel embedded system for better detection of perilous gases 一种新型的嵌入式系统,可以更好地检测危险气体
A. Asaduzzaman, M. Mridha, K. K. Chidella
Gas leakage is a major problem in industrial sectors, residential premises, and gas-powered vehicles such as compressed natural gas (CNG) cars. The gas detection kits are used to detect the gas leakage at vulnerable places to prevent accidents due to harmful gases. Studies show that modern embedded systems have potential to detect gases and alert people. Various sensors are used (in the embedded systems) to detect various harmful gases. However, most commercially available systems can detect only one gas. The aim of this paper is to introduce an embedded system that can detect various perilous gases and automatically alert about gas leakage in vulnerable premises as needed. The experimental gas leakage system consists of a Carbon Dioxide (CO2) sensor, Carbon Monoxide (CO) sensor, temperature sensor, microcontroller, air conditioner, and a buzzer. The use of temperature sensor is not just confined to detect the temperature but it is used to control the heating ventilation and air conditioning (HVAC) applications inside the residential premises. According to preliminary experiments, the proposed system can detect both CO and CO2 with up to 98% accuracy, control HVAC applications, and alert people in case of a gas leakage. Comparing with two similar contemporary systems, the proposed system offers more and better useful features such as detecting multiple gases, displaying messages, and triggering alarm system.
气体泄漏是工业部门、住宅和压缩天然气(CNG)汽车等燃气动力车辆的主要问题。气体检测套件用于检测易损处的气体泄漏情况,防止有害气体造成事故。研究表明,现代嵌入式系统具有检测气体并向人们发出警报的潜力。(在嵌入式系统中)使用各种传感器来检测各种有害气体。然而,大多数商用系统只能检测一种气体。本文的目的是介绍一种嵌入式系统,该系统可以检测各种危险气体,并根据需要自动警报脆弱房屋的气体泄漏。实验气体泄漏系统主要由二氧化碳传感器、一氧化碳传感器、温度传感器、单片机、空调、蜂鸣器等组成。温度传感器的使用不仅限于检测温度,还用于控制住宅内的采暖通风和空调(HVAC)应用。根据初步实验,所提出的系统可以检测CO和CO2的准确率高达98%,控制暖通空调应用,并在气体泄漏时提醒人们。与现有的两种同类系统相比,该系统具有多种气体检测、信息显示、报警等功能。
{"title":"A novel embedded system for better detection of perilous gases","authors":"A. Asaduzzaman, M. Mridha, K. K. Chidella","doi":"10.1109/SKIMA.2014.7083559","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083559","url":null,"abstract":"Gas leakage is a major problem in industrial sectors, residential premises, and gas-powered vehicles such as compressed natural gas (CNG) cars. The gas detection kits are used to detect the gas leakage at vulnerable places to prevent accidents due to harmful gases. Studies show that modern embedded systems have potential to detect gases and alert people. Various sensors are used (in the embedded systems) to detect various harmful gases. However, most commercially available systems can detect only one gas. The aim of this paper is to introduce an embedded system that can detect various perilous gases and automatically alert about gas leakage in vulnerable premises as needed. The experimental gas leakage system consists of a Carbon Dioxide (CO2) sensor, Carbon Monoxide (CO) sensor, temperature sensor, microcontroller, air conditioner, and a buzzer. The use of temperature sensor is not just confined to detect the temperature but it is used to control the heating ventilation and air conditioning (HVAC) applications inside the residential premises. According to preliminary experiments, the proposed system can detect both CO and CO2 with up to 98% accuracy, control HVAC applications, and alert people in case of a gas leakage. Comparing with two similar contemporary systems, the proposed system offers more and better useful features such as detecting multiple gases, displaying messages, and triggering alarm system.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"37 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78353716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mongol Barota: A next generation rover 蒙古巴罗塔:下一代漫游者
Md. Kishwar Shafin, Kazi Lutful Kabir, I. Ridwan, Tanvir Ahmed Fuad, Sharmistha Bardhan, Md Ismail Hossain Raju, Afifa Tahira, Ibtasham Afrin, Sushmita Mondal, Sanjida Nasreen Tumpa, Ashfaque Ahmed, Minhajul A. Badhon, Muhammad Tanvirul Islam Jony, Fahim Hasan Khan, Md. Mahboob Karim, Md. Afzal Hossain
This paper scrutinizes Mongol Barota - a fully functional, stand-alone mobile platform rover which is capable to act as a human assistant to perform various scientific tasks in extreme adversities. The control system of the rover is designed in such a way that it can be commanded from a blind station within 1 kilometer range. It has successfully taken part in 8th annual University Rover Challenge organized by the Mars Society at the Mars Desert Research Station (MDRS) in the remote, barren desert of southern Utah, USA in late May, 2014. It has been traced out as the first entrance in this competition from Bangladesh and occupied 12th position out of 31 registered teams from 6 countries of 4 continents. The rover architecture maps the associated components to make it capable to perform the assigned tasks namely - Sample Return Task, Astronaut Assistance Task, Equipment Servicing Task and Terrain Traversing Task. Among these, the first task refers to search for the evidence to identify the existence of life after detailed analysis of collected soil sample from a selected site. In Equipment servicing task, rover has to perform a sequence of operations that mainly includes switching on a compressor and working with a series of pipes, hoses, valves and other such equipment. Astronaut assistance task intends the rover to collect tools from some given GPS locations and then delivery of each of them to the corresponding locations with provided GPS coordinates. Rover has to traverse an adverse terrain in order to pass through a set of target gates for completion of the terrain traversing task. This paper provides a detailed demonstration of the Mongol Barota rover, ins and outs of its architecture, facts and features, system components, logic, logistics and techniques adopted to implement several tasks representing its overall capabilities.
本文详细介绍了蒙古巴罗塔-一个功能齐全,独立的移动平台漫游车,能够作为人类助手在极端逆境中执行各种科学任务。月球车的控制系统被设计成可以从1公里范围内的盲站指挥。2014年5月下旬,它成功参加了由火星协会在美国犹他州南部偏远贫瘠的沙漠中的火星沙漠研究站(MDRS)组织的第八届年度大学漫游者挑战赛。这是孟加拉国第一次参加这项比赛,在来自四大洲6个国家的31支注册队伍中排名第12。漫游车的架构映射了相关的组件,使其能够执行指定的任务,即样本返回任务,宇航员援助任务,设备维修任务和地形穿越任务。其中,第一项任务是通过对选定地点采集的土壤样本进行详细分析,寻找生命存在的证据。在设备维修任务中,漫游者必须执行一系列操作,主要包括打开压缩机和使用一系列管道、软管、阀门等设备。宇航员辅助任务是让漫游者从一些给定的GPS位置收集工具,然后根据提供的GPS坐标将每个工具送到相应的位置。漫游者必须穿越一个不利的地形,以通过一组目标门来完成地形穿越任务。本文提供了蒙古巴罗塔漫游者的详细演示,其架构的来龙去脉,事实和特征,系统组件,逻辑,后勤和技术采用来实现代表其整体能力的几个任务。
{"title":"Mongol Barota: A next generation rover","authors":"Md. Kishwar Shafin, Kazi Lutful Kabir, I. Ridwan, Tanvir Ahmed Fuad, Sharmistha Bardhan, Md Ismail Hossain Raju, Afifa Tahira, Ibtasham Afrin, Sushmita Mondal, Sanjida Nasreen Tumpa, Ashfaque Ahmed, Minhajul A. Badhon, Muhammad Tanvirul Islam Jony, Fahim Hasan Khan, Md. Mahboob Karim, Md. Afzal Hossain","doi":"10.1109/SKIMA.2014.7083564","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083564","url":null,"abstract":"This paper scrutinizes Mongol Barota - a fully functional, stand-alone mobile platform rover which is capable to act as a human assistant to perform various scientific tasks in extreme adversities. The control system of the rover is designed in such a way that it can be commanded from a blind station within 1 kilometer range. It has successfully taken part in 8th annual University Rover Challenge organized by the Mars Society at the Mars Desert Research Station (MDRS) in the remote, barren desert of southern Utah, USA in late May, 2014. It has been traced out as the first entrance in this competition from Bangladesh and occupied 12th position out of 31 registered teams from 6 countries of 4 continents. The rover architecture maps the associated components to make it capable to perform the assigned tasks namely - Sample Return Task, Astronaut Assistance Task, Equipment Servicing Task and Terrain Traversing Task. Among these, the first task refers to search for the evidence to identify the existence of life after detailed analysis of collected soil sample from a selected site. In Equipment servicing task, rover has to perform a sequence of operations that mainly includes switching on a compressor and working with a series of pipes, hoses, valves and other such equipment. Astronaut assistance task intends the rover to collect tools from some given GPS locations and then delivery of each of them to the corresponding locations with provided GPS coordinates. Rover has to traverse an adverse terrain in order to pass through a set of target gates for completion of the terrain traversing task. This paper provides a detailed demonstration of the Mongol Barota rover, ins and outs of its architecture, facts and features, system components, logic, logistics and techniques adopted to implement several tasks representing its overall capabilities.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"74 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81629331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A cellular automaton model for hypoxia effects on tumour growth dynamics 缺氧对肿瘤生长动力学影响的细胞自动机模型
M. Al-Mamun, W. Srisukkham, C. Fall, R. Bass, Md. Alamgir Hossain, D. Farid
Cancer is one of the biggest killers in the western world; every two minutes someone is diagnosed with cancer in the UK. Tumour growth and progression is a complex biological process, normally beginning with genetic mutations in a single cell. It starts with the early or avascular phase where growth is limited by nutrient diffusion, then the vascular stage where angiogenesis occurs to stimulate blood vessel production by the secretion of tumour angiogenesis factors and finally the metastasitic phase where the tumour spreads from the site of origin to distant sites around the body. While considering these events at the cellular level, these processes involve many microenvironment parameters like oxygen concentration, hypoglycaemia, acidity, hypoxia (lack of oxygen), cell-cell adhesion, cell migration and cell-extracellular matrix interactions. In this paper, a computational model is proposed which considered hypoxia as a microenvironment constraint of tumour growth. The model is built on two dimensional cellular automata grid and artificial neural network is considered for establishing signaling network of tumour cells. Each tumour cell can take its own decision in this model. A hypoxia impact was implemented in the model by varying different oxygen concentrations. The results show that hypoxia was introduced in the tumour mass due to lack of oxygen. The model measured tumour invasion and the number of apoptotic cells to support that hypoxia has a critical impacts on avascular tumour growth. This model could inform a better understanding of the impacts of hypoxia in tumour growth from the computational point of view.
癌症是西方世界最大的杀手之一;在英国,每两分钟就有人被诊断出患有癌症。肿瘤的生长和发展是一个复杂的生物学过程,通常从单个细胞的基因突变开始。它开始于早期或无血管期,生长受到营养扩散的限制,然后是血管期,血管生成发生,通过肿瘤血管生成因子的分泌刺激血管生成,最后是转移期,肿瘤从起源部位扩散到身体周围的远处部位。在细胞水平上考虑这些事件时,这些过程涉及许多微环境参数,如氧浓度、低血糖、酸度、缺氧(缺氧)、细胞-细胞粘附、细胞迁移和细胞-细胞外基质相互作用。本文提出了一个考虑缺氧作为肿瘤生长微环境约束的计算模型。该模型建立在二维细胞自动机网格上,采用人工神经网络建立肿瘤细胞信号网络。在这个模型中,每个肿瘤细胞都可以做出自己的决定。通过改变不同的氧浓度,在模型中实现了缺氧影响。结果表明,由于缺氧,肿瘤团块中引入了缺氧。该模型测量了肿瘤侵袭和凋亡细胞的数量,以支持缺氧对无血管肿瘤生长有重要影响。该模型可以从计算的角度更好地了解缺氧对肿瘤生长的影响。
{"title":"A cellular automaton model for hypoxia effects on tumour growth dynamics","authors":"M. Al-Mamun, W. Srisukkham, C. Fall, R. Bass, Md. Alamgir Hossain, D. Farid","doi":"10.1109/SKIMA.2014.7083562","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083562","url":null,"abstract":"Cancer is one of the biggest killers in the western world; every two minutes someone is diagnosed with cancer in the UK. Tumour growth and progression is a complex biological process, normally beginning with genetic mutations in a single cell. It starts with the early or avascular phase where growth is limited by nutrient diffusion, then the vascular stage where angiogenesis occurs to stimulate blood vessel production by the secretion of tumour angiogenesis factors and finally the metastasitic phase where the tumour spreads from the site of origin to distant sites around the body. While considering these events at the cellular level, these processes involve many microenvironment parameters like oxygen concentration, hypoglycaemia, acidity, hypoxia (lack of oxygen), cell-cell adhesion, cell migration and cell-extracellular matrix interactions. In this paper, a computational model is proposed which considered hypoxia as a microenvironment constraint of tumour growth. The model is built on two dimensional cellular automata grid and artificial neural network is considered for establishing signaling network of tumour cells. Each tumour cell can take its own decision in this model. A hypoxia impact was implemented in the model by varying different oxygen concentrations. The results show that hypoxia was introduced in the tumour mass due to lack of oxygen. The model measured tumour invasion and the number of apoptotic cells to support that hypoxia has a critical impacts on avascular tumour growth. This model could inform a better understanding of the impacts of hypoxia in tumour growth from the computational point of view.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76364593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties 具有混合无源、负虚和小增益特性的离散互联系统的稳定性分析
M. Rahman, A. Al Mamun, K. Yao
A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties is briefly presented in this paper. These results are analogous to previously established continuous-time case. Nowadays most of the control design is done in discrete-time. Hence, this paper provides a foundation for discretization of mixed system with passivity, negative-imaginary and small-gain properties. Numerical example and practical plant model example with simulation results substantiate the usefulness of the proposed stability analysis.
本文简要地分析了具有混合无源、负虚和小增益特性的离散时间互联系统的稳定性。这些结果与先前建立的连续时间情况类似。目前大多数的控制设计都是在离散时间内完成的。从而为无源、负虚和小增益混合系统的离散化提供了基础。数值算例和具有仿真结果的实际工厂模型算例验证了所提出的稳定性分析的有效性。
{"title":"A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties","authors":"M. Rahman, A. Al Mamun, K. Yao","doi":"10.1109/SKIMA.2014.7083553","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083553","url":null,"abstract":"A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties is briefly presented in this paper. These results are analogous to previously established continuous-time case. Nowadays most of the control design is done in discrete-time. Hence, this paper provides a foundation for discretization of mixed system with passivity, negative-imaginary and small-gain properties. Numerical example and practical plant model example with simulation results substantiate the usefulness of the proposed stability analysis.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80884590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ant Colony Optimization, Genetic Programming and a hybrid approach for credit scoring: A comparative study 蚁群优化、遗传规划与混合信用评分方法之比较研究
Rojin Aliehyaei, Shamim Khan
Credit scoring is a commonly used method for evaluating the risk involved in granting credits. Both Genetic Programming (GP) and Ant Colony Optimization (ACO) have been investigated in the past as possible tools for credit scoring. This paper reports an investigation into the relative performances of GP, ACO and a new hybrid GP-ACO approach, which relies on the ACO technique to produce the initial populations for the GP technique. Performance of the hybrid approach has been compared with both the GP and ACO approaches using two well-known benchmark data sets. Experimental results demonstrate the dependence of GP and ACO classification accuracies on the input data set. For any given data set, the hybrid approach performs better than the worse of the other two methods. Results also show that use of ACO in the hybrid approach has only a limited impact in improving GP performance.
信用评分是一种常用的评估授信风险的方法。遗传规划(GP)和蚁群优化(ACO)在过去被研究作为信用评分的可能工具。本文研究了遗传算法与蚁群算法的相对性能,以及一种基于蚁群算法生成遗传算法初始种群的新型遗传算法-蚁群算法。使用两个众所周知的基准数据集,将混合方法的性能与GP和ACO方法进行了比较。实验结果表明,遗传算法和蚁群算法的分类精度依赖于输入数据集。对于任何给定的数据集,混合方法的性能优于其他两种方法中的较差方法。结果还表明,在混合方法中使用蚁群算法对提高GP性能的影响有限。
{"title":"Ant Colony Optimization, Genetic Programming and a hybrid approach for credit scoring: A comparative study","authors":"Rojin Aliehyaei, Shamim Khan","doi":"10.1109/SKIMA.2014.7083391","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083391","url":null,"abstract":"Credit scoring is a commonly used method for evaluating the risk involved in granting credits. Both Genetic Programming (GP) and Ant Colony Optimization (ACO) have been investigated in the past as possible tools for credit scoring. This paper reports an investigation into the relative performances of GP, ACO and a new hybrid GP-ACO approach, which relies on the ACO technique to produce the initial populations for the GP technique. Performance of the hybrid approach has been compared with both the GP and ACO approaches using two well-known benchmark data sets. Experimental results demonstrate the dependence of GP and ACO classification accuracies on the input data set. For any given data set, the hybrid approach performs better than the worse of the other two methods. Results also show that use of ACO in the hybrid approach has only a limited impact in improving GP performance.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89834196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
BLASTAssemb: An approach to construct genetic elements using BLAST BLASTAssemb:一种使用BLAST构建遗传元素的方法
Tasnim Rahman, Tasnova Chowdhury, Shamira Tabrejee, Md Miraj Kobad Chowdhury, M. Shoyaib
With the availability of recent next generation sequencing technologies and cheap price, genome of different organisms is now being sequenced frequently. Therefore, quick assembling of a genetic element from the raw genome generated through the sequencing technologies has become necessary for better understanding of different biological systems. This paper proposes an algorithm for constructing genetic elements from raw genome using reference sequences. For this, we considered a weighted frequency based consensus making mechanism. Furthermore, we have used BLAST (Basic local alignment search tool), a well known tool to the community of bioinformaticians, in this regard. The proposed method, thus applies the capability of BLAST, which enables the construction of genetic elements from raw sequences. For evaluating our algorithm, we have chosen Pokkali (a verity of rice) raw genome and few promoters of Japonica (another verity of rice) as our reference data. Experimental results demonstrated that our proposed algorithm could accurately construct the promoter sequences of Pokkali from its raw genome sequences.
随着新一代测序技术的发展和价格的降低,不同生物的基因组测序越来越频繁。因此,通过测序技术从原始基因组中快速组装遗传元件对于更好地理解不同的生物系统是必要的。提出了一种利用参考序列从原始基因组中构建遗传元件的算法。为此,我们考虑了一种基于加权频率的共识形成机制。此外,我们在这方面使用了BLAST (Basic local alignment search tool),这是生物信息学家社区中众所周知的工具。因此,该方法应用BLAST的能力,可以从原始序列中构建遗传元素。为了评估我们的算法,我们选择了Pokkali(一种水稻)的原始基因组和Japonica(另一种水稻)的少数启动子作为参考数据。实验结果表明,本文提出的算法能够准确地从Pokkali的原始基因组序列中构建其启动子序列。
{"title":"BLASTAssemb: An approach to construct genetic elements using BLAST","authors":"Tasnim Rahman, Tasnova Chowdhury, Shamira Tabrejee, Md Miraj Kobad Chowdhury, M. Shoyaib","doi":"10.1109/SKIMA.2014.7083544","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083544","url":null,"abstract":"With the availability of recent next generation sequencing technologies and cheap price, genome of different organisms is now being sequenced frequently. Therefore, quick assembling of a genetic element from the raw genome generated through the sequencing technologies has become necessary for better understanding of different biological systems. This paper proposes an algorithm for constructing genetic elements from raw genome using reference sequences. For this, we considered a weighted frequency based consensus making mechanism. Furthermore, we have used BLAST (Basic local alignment search tool), a well known tool to the community of bioinformaticians, in this regard. The proposed method, thus applies the capability of BLAST, which enables the construction of genetic elements from raw sequences. For evaluating our algorithm, we have chosen Pokkali (a verity of rice) raw genome and few promoters of Japonica (another verity of rice) as our reference data. Experimental results demonstrated that our proposed algorithm could accurately construct the promoter sequences of Pokkali from its raw genome sequences.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to provide security to unstructured Big Data 一种为非结构化大数据提供安全保障的方法
M. Islam, Md. Ezazul Islam
Security of Big Data is a big concern. In broad sense Big Data contains two types of data such as structured and unstructured. To provide security to unstructured data is more difficult than that of structured. In this paper we have developed an approach to give adequate security to the unstructured data by considering the types of the data and their sensitivity levels. We have reviewed the different analytics methods of Big Data, which gives us the facility to build a data node of databases of different types of data. Each type of data has been further classified to provide adequate security and enhance the overhead of the security system. To provide security to data node a security suite has been designed by incorporating different security standards and algorithms. The proper security standards or algorithms can be activated using an algorithm, which has been interfaced with the data node. We have shown that data classification with respect to sensitivity levels enhance the performance of the system.
大数据的安全性是一个大问题。广义的大数据包含结构化和非结构化两类数据。为非结构化数据提供安全性比为结构化数据提供安全性要困难得多。在本文中,我们开发了一种方法,通过考虑数据的类型和它们的敏感性级别来给予非结构化数据足够的安全性。我们回顾了大数据的不同分析方法,这使我们能够构建不同类型数据的数据库的数据节点。每种类型的数据都已进一步分类,以提供足够的安全性并提高安全系统的开销。为了保证数据节点的安全性,设计了一个集成了不同安全标准和算法的安全套件。可以使用与数据节点连接的算法来激活适当的安全标准或算法。我们已经表明,相对于灵敏度水平的数据分类提高了系统的性能。
{"title":"An approach to provide security to unstructured Big Data","authors":"M. Islam, Md. Ezazul Islam","doi":"10.1109/SKIMA.2014.7083392","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083392","url":null,"abstract":"Security of Big Data is a big concern. In broad sense Big Data contains two types of data such as structured and unstructured. To provide security to unstructured data is more difficult than that of structured. In this paper we have developed an approach to give adequate security to the unstructured data by considering the types of the data and their sensitivity levels. We have reviewed the different analytics methods of Big Data, which gives us the facility to build a data node of databases of different types of data. Each type of data has been further classified to provide adequate security and enhance the overhead of the security system. To provide security to data node a security suite has been designed by incorporating different security standards and algorithms. The proper security standards or algorithms can be activated using an algorithm, which has been interfaced with the data node. We have shown that data classification with respect to sensitivity levels enhance the performance of the system.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"22 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84668153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Freeman chain code with digits of unequal cost 具有不相等成本数字的弗里曼链码
Sohag Kabir, Tanzima Azad, A. S. M. Ashraful Alam
Chain codes are the most size-efficient lossless compression methods for representing rasterised binary objects and contours. Satisfactory compression ratio, low processing cost and low storage requirements of the decoder make chain code technique interesting for storage and transmission of predefined graphical objects in embedded environments. Each element in the chain is encoded to show the relative angle difference between two adjacent pixels along the boundary of an object. The cost of binary bits representing the codes are considered to be equal. Yet, more efficient encoding is possible by considering and applying technique that treats the binary bits differently considering its requirement of storage space, energy consumption, speed of execution and etc. This paper considers cost of binary digits as unequal and proposes a new representation of the eight-direction Freeman chain code based on a variation of Huffman coding technique, which considers cost of bits as unequal. The evaluation and comparison of the cost efficiency between classical Freeman chain code and the new representation of the chain code is provided. Our experiments yield that the proposed representation of Freeman Chain code reduces overall storage/transmission cost of encoded objects considerably with compared to classical Freeman chain code.
链码是表示栅格化二进制对象和轮廓的最有效的无损压缩方法。令人满意的压缩比、较低的处理成本和较低的解码器存储要求使链码技术成为嵌入式环境中预定义图形对象的存储和传输的兴趣。链中的每个元素都经过编码,以显示沿对象边界的两个相邻像素之间的相对角度差。表示代码的二进制位的代价被认为是相等的。然而,考虑到二进制位对存储空间、能量消耗、执行速度等方面的要求,考虑和应用对二进制位进行不同处理的技术,可以实现更高效的编码。考虑到二进制位元的代价不相等,在改进的霍夫曼编码技术的基础上,提出了一种考虑位元代价不相等的八向弗里曼链码的表示方法。给出了经典Freeman链码与新型链码表示的成本效率评价和比较。我们的实验表明,与经典的弗里曼链码相比,所提出的弗里曼链码表示大大降低了编码对象的总体存储/传输成本。
{"title":"Freeman chain code with digits of unequal cost","authors":"Sohag Kabir, Tanzima Azad, A. S. M. Ashraful Alam","doi":"10.1109/SKIMA.2014.7083531","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083531","url":null,"abstract":"Chain codes are the most size-efficient lossless compression methods for representing rasterised binary objects and contours. Satisfactory compression ratio, low processing cost and low storage requirements of the decoder make chain code technique interesting for storage and transmission of predefined graphical objects in embedded environments. Each element in the chain is encoded to show the relative angle difference between two adjacent pixels along the boundary of an object. The cost of binary bits representing the codes are considered to be equal. Yet, more efficient encoding is possible by considering and applying technique that treats the binary bits differently considering its requirement of storage space, energy consumption, speed of execution and etc. This paper considers cost of binary digits as unequal and proposes a new representation of the eight-direction Freeman chain code based on a variation of Huffman coding technique, which considers cost of bits as unequal. The evaluation and comparison of the cost efficiency between classical Freeman chain code and the new representation of the chain code is provided. Our experiments yield that the proposed representation of Freeman Chain code reduces overall storage/transmission cost of encoded objects considerably with compared to classical Freeman chain code.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"252 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84456135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent Appearance and shape based facial emotion recognition for a humanoid robot 基于智能外观和形状的类人机器人面部情感识别
Kamlesh Mistry, Li Zhang, S. Neoh, Ming Jiang, Md. Alamgir Hossain, Benoit Lafon
In this paper, we present an intelligent facial emotion recognition system with real-time face tracking for a humanoid robot. The system is able to detect facial actions and emotions from images with up to 60 degrees of pose variations. We employ the Active Appearance Model to perform real-time face tracking and extract both texture and geometric representations of images. A POSIT algorithm is also used to identify head rotations. The extracted texture and shape features are employed to detect 18 facial actions and seven basic emotions. The overall system is integrated with a humanoid robot platform to further extend its vision APIs. The system is proved to be able to deal with challenging facial emotion recognition tasks with various pose variations.
本文提出了一种具有实时人脸跟踪功能的仿人机器人智能面部情感识别系统。该系统能够从多达60度的姿势变化的图像中检测面部动作和情绪。我们采用主动外观模型进行实时人脸跟踪,并提取图像的纹理和几何表示。POSIT算法也用于识别头部旋转。提取的纹理和形状特征用于检测18种面部动作和7种基本情绪。整个系统集成了一个人形机器人平台,以进一步扩展其视觉api。该系统被证明能够处理各种姿势变化的面部情感识别任务。
{"title":"Intelligent Appearance and shape based facial emotion recognition for a humanoid robot","authors":"Kamlesh Mistry, Li Zhang, S. Neoh, Ming Jiang, Md. Alamgir Hossain, Benoit Lafon","doi":"10.1109/SKIMA.2014.7083542","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083542","url":null,"abstract":"In this paper, we present an intelligent facial emotion recognition system with real-time face tracking for a humanoid robot. The system is able to detect facial actions and emotions from images with up to 60 degrees of pose variations. We employ the Active Appearance Model to perform real-time face tracking and extract both texture and geometric representations of images. A POSIT algorithm is also used to identify head rotations. The extracted texture and shape features are employed to detect 18 facial actions and seven basic emotions. The overall system is integrated with a humanoid robot platform to further extend its vision APIs. The system is proved to be able to deal with challenging facial emotion recognition tasks with various pose variations.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78112176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security of SIP-based infrastructure against malicious message attacks 基于sip协议的基础设施防范恶意消息攻击的安全性
A. Shrestha
Nowadays Session Initiation Protocol (SIP) has become the most widely used signaling protocol by the vendors in the Voice over Internet Protocol (VoIP) communication. As the SIP is gaining popularity, open architecture of VoIP often makes SIP vulnerable to so many threats. The paper introduces SIP along with its different security mechanisms with the focus on attack signatures generation technique to identify the malformed SIP messages. It aims to generate various malicious SIP messages and to verify the limitations of the existing classical Intrusion Detection System (IDS) in identifying the malicious messages. Then it sets out to implement an improved detection framework using the rules as regular expression. The experiments were carried out using SER as an open source SIP server, Kphone and X-lite as SIP clients and the SIPSAK as an attacking tool on a testbed architecture which was in a form of virtual environment created with VMware. The platforms used were BackTrack7 and Windows 7. The test was first performed on SNORT, an open source IDS and later by adding the improved detection rules in the configuration file of the SIP server. The successful attacks on the classical attack-signatures generation framework proved that the existing IDSs couldn't identify logical errors in the malicious SIP messages. The proposed detection module identified and rejected all kind of malicious SIP messages with acceptable processing overheads. Moreover the associated signatures database can also be incorporated into other VoIP protocols and open source IDSs like SNORT. This paper has provided the effective mechanism in creating well-formed defense against malicious SIP message attacks to ensure the integrity and security of VoIP subsystems.
目前,会话发起协议(SIP)已成为各厂商在互联网语音(VoIP)通信中使用最广泛的信令协议。随着SIP协议的日益普及,VoIP的开放式体系结构往往使SIP协议容易受到各种威胁。本文介绍了SIP协议及其不同的安全机制,重点介绍了攻击签名生成技术,以识别SIP协议中的畸形消息。该研究旨在生成各种恶意SIP消息,并验证现有经典入侵检测系统在识别恶意消息方面的局限性。然后,它开始实现一个改进的检测框架,使用规则作为正则表达式。实验使用SER作为开源SIP服务器,Kphone和X-lite作为SIP客户端,SIPSAK作为攻击工具,在VMware创建的虚拟环境形式的测试平台架构上进行。使用的平台是BackTrack7和Windows 7。测试首先在SNORT(一个开放源码IDS)上执行,然后在SIP服务器的配置文件中添加改进的检测规则。对经典攻击签名生成框架的成功攻击证明,现有的入侵防御系统无法识别恶意SIP消息中的逻辑错误。所提出的检测模块在可接受的处理开销下识别并拒绝所有类型的恶意SIP消息。此外,相关的签名数据库还可以合并到其他VoIP协议和开源ids(如SNORT)中。本文提供了一种有效的机制来建立良好的防御恶意SIP消息攻击,以保证VoIP子系统的完整性和安全性。
{"title":"Security of SIP-based infrastructure against malicious message attacks","authors":"A. Shrestha","doi":"10.1109/SKIMA.2014.7083519","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083519","url":null,"abstract":"Nowadays Session Initiation Protocol (SIP) has become the most widely used signaling protocol by the vendors in the Voice over Internet Protocol (VoIP) communication. As the SIP is gaining popularity, open architecture of VoIP often makes SIP vulnerable to so many threats. The paper introduces SIP along with its different security mechanisms with the focus on attack signatures generation technique to identify the malformed SIP messages. It aims to generate various malicious SIP messages and to verify the limitations of the existing classical Intrusion Detection System (IDS) in identifying the malicious messages. Then it sets out to implement an improved detection framework using the rules as regular expression. The experiments were carried out using SER as an open source SIP server, Kphone and X-lite as SIP clients and the SIPSAK as an attacking tool on a testbed architecture which was in a form of virtual environment created with VMware. The platforms used were BackTrack7 and Windows 7. The test was first performed on SNORT, an open source IDS and later by adding the improved detection rules in the configuration file of the SIP server. The successful attacks on the classical attack-signatures generation framework proved that the existing IDSs couldn't identify logical errors in the malicious SIP messages. The proposed detection module identified and rejected all kind of malicious SIP messages with acceptable processing overheads. Moreover the associated signatures database can also be incorporated into other VoIP protocols and open source IDSs like SNORT. This paper has provided the effective mechanism in creating well-formed defense against malicious SIP message attacks to ensure the integrity and security of VoIP subsystems.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"25 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74563114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1