Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740356
Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni
The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.
{"title":"New Proposed Z-Transform Based Encryption Algorithm","authors":"Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni","doi":"10.1109/ICITCS.2016.7740356","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740356","url":null,"abstract":"The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740324
Taimoor Hassan, Shoaib Hassan
In the recent past, domain specific solutions for detailed semantic analysis have got acceptable by natural language processing community and use of applications involving natural language based user interface. Different approaches that has been previously used is focusing on quality of text and improving the text contents by adding semantic information with text then the existing approaches used for semantic analysis can provide better results. In this, an approach was presented to address the problem of non- availability of semantic information required for better semantic analysis. This problem is solved by using semantic technology to annotate text of software requirements expressed in a natural language with their domain specific semantics and investigate the effect of semantic analysis with attached semantics. The presented approach uses a semantic framework specifically designed for interpretation and detailed semantic analysis of natural language software requirement specifications. The used framework is based on semantic technology involves knowledge extracted from existing software requirement documents and knowledge extracted from existing applications. The presented approach shows that by adapting and combing existing ontologies to support knowledge management, developing system and performing experiments on requirement of real world software systems. In this approach start with software requirement specification, after this clean the irrelevant requirements, convert the cleaned requirements into graph that represents inter related different elements. Represent the requirement graph into sparse matrix, after these all steps; we generate ontology with the help of OntoGen tool.
{"title":"Design Semantic Framework for Software Requirement Specification","authors":"Taimoor Hassan, Shoaib Hassan","doi":"10.1109/ICITCS.2016.7740324","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740324","url":null,"abstract":"In the recent past, domain specific solutions for detailed semantic analysis have got acceptable by natural language processing community and use of applications involving natural language based user interface. Different approaches that has been previously used is focusing on quality of text and improving the text contents by adding semantic information with text then the existing approaches used for semantic analysis can provide better results. In this, an approach was presented to address the problem of non- availability of semantic information required for better semantic analysis. This problem is solved by using semantic technology to annotate text of software requirements expressed in a natural language with their domain specific semantics and investigate the effect of semantic analysis with attached semantics. The presented approach uses a semantic framework specifically designed for interpretation and detailed semantic analysis of natural language software requirement specifications. The used framework is based on semantic technology involves knowledge extracted from existing software requirement documents and knowledge extracted from existing applications. The presented approach shows that by adapting and combing existing ontologies to support knowledge management, developing system and performing experiments on requirement of real world software systems. In this approach start with software requirement specification, after this clean the irrelevant requirements, convert the cleaned requirements into graph that represents inter related different elements. Represent the requirement graph into sparse matrix, after these all steps; we generate ontology with the help of OntoGen tool.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740341
Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and crossmatching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, Error Correcting Code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.
{"title":"Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique","authors":"Suzwani Ismail, Fakariah Hani Mohd Ali, S. A. Aljunid","doi":"10.1109/ICITCS.2016.7740341","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740341","url":null,"abstract":"Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and crossmatching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, Error Correcting Code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740339
Sarmad Mohammad
Abstract- Arab Open University conducted an online survey to determine the degree of usage for specific project management software to develop and enhance the project management process in Kingdom of Bahrain. The main purpose of this study is to find out new approach to make the use of project management more effective and efficient as possible. It's started with overview of the framework of project management and the current way to deal with project software. Functionality versus complexity and SWOT analysis conducted to find out the weak point in the current process; to check for the chance of enhancement and "new opportunity" to empower the current strength and to construct an effective metrics for these significant issues of most frequently software implemented in kingdom of Bahrain. The problem mainly stated that the users of project management software not take the full advantage of the information technology which raises the questions: how much users rely on the project management software and degree to measure user's satisfaction with the current project management software.
{"title":"Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain","authors":"Sarmad Mohammad","doi":"10.1109/ICITCS.2016.7740339","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740339","url":null,"abstract":"Abstract- Arab Open University conducted an online survey to determine the degree of usage for specific project management software to develop and enhance the project management process in Kingdom of Bahrain. The main purpose of this study is to find out new approach to make the use of project management more effective and efficient as possible. It's started with overview of the framework of project management and the current way to deal with project software. Functionality versus complexity and SWOT analysis conducted to find out the weak point in the current process; to check for the chance of enhancement and \"new opportunity\" to empower the current strength and to construct an effective metrics for these significant issues of most frequently software implemented in kingdom of Bahrain. The problem mainly stated that the users of project management software not take the full advantage of the information technology which raises the questions: how much users rely on the project management software and degree to measure user's satisfaction with the current project management software.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740365
Abhijit Banerjee, D. Ghosh, Suvrojit Das
This paper proposes a modified firefly algorithm (PropFA) to solve highly multimodal problems with fast convergence. In this algorithm every firefly is fitted with a short term memory which facilitates the "Repulsion" force acting on every firefly whereas the introduction of brightness of the best firefly in the movement equation facilitates "Propulsion" force acting on the firefly. Furthermore; no firefly is allowed to move beyond its maximum stride parameter to prevent premature convergence. All other parameters α,β and γ and are designed to be adaptive to suite to almost all multimodal problems without setting them to any a-priori values. Efficiency of PropFA is then verified over six standard test functions. In all of them it is observed that PropFA converges faster than FA and PSO.
{"title":"Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems","authors":"Abhijit Banerjee, D. Ghosh, Suvrojit Das","doi":"10.1109/ICITCS.2016.7740365","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740365","url":null,"abstract":"This paper proposes a modified firefly algorithm (PropFA) to solve highly multimodal problems with fast convergence. In this algorithm every firefly is fitted with a short term memory which facilitates the \"Repulsion\" force acting on every firefly whereas the introduction of brightness of the best firefly in the movement equation facilitates \"Propulsion\" force acting on the firefly. Furthermore; no firefly is allowed to move beyond its maximum stride parameter to prevent premature convergence. All other parameters α,β and γ and are designed to be adaptive to suite to almost all multimodal problems without setting them to any a-priori values. Efficiency of PropFA is then verified over six standard test functions. In all of them it is observed that PropFA converges faster than FA and PSO.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127122033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICITCS.2016.7740307
Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim
Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.
{"title":"A Secure Agent Based Architecture for Resource Allocation in Cloud Computing","authors":"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim","doi":"10.1109/ICITCS.2016.7740307","DOIUrl":"https://doi.org/10.1109/ICITCS.2016.7740307","url":null,"abstract":"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131631337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITCS.2014.7021731
Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang
This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future works.
{"title":"An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market","authors":"Bing Li, Xin Fang, R. Sun, Xue Luo, Wei-Hao Chang","doi":"10.1109/ICITCS.2014.7021731","DOIUrl":"https://doi.org/10.1109/ICITCS.2014.7021731","url":null,"abstract":"This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future works.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-01DOI: 10.1007/978-94-007-5860-5_18
G. Sharma, S. Bala, A. Verma
{"title":"An Identity-Based Ring Signcryption Scheme","authors":"G. Sharma, S. Bala, A. Verma","doi":"10.1007/978-94-007-5860-5_18","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_18","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-26DOI: 10.1007/978-94-007-5860-5_136
Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim
{"title":"Full-Scaled Experiment for Behavior Investigation of Reinforced Concrete Columns with High-Strength Wire Ropes as Lateral Spiral Reinforcement","authors":"Kyu Won Kim, J. Won, S. Jung, Jung Won Park, Moonok Kim","doi":"10.1007/978-94-007-5860-5_136","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_136","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-02-26DOI: 10.1007/978-94-007-5860-5_4
M. Ali, M. A. Maarof
{"title":"A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory","authors":"M. Ali, M. A. Maarof","doi":"10.1007/978-94-007-5860-5_4","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_4","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}