首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling Cost IEEE 802.21 MIH功能辅助代理移动IPv6减少切换延迟和信令开销
P. Kim, Mun-Suck Jang, E. Lee
This paper proposes an IEEE 802.21 Media Independent Handover (MIH) functionality assisted Proxy Mobile IPv6 (PMIPv6) mechanism for reducing handover latency and signaling cost in heterogeneous wireless networks. The proposed mechanism comes to support fast vertical handover for the mobile node (MN) irrespective of the presence or absence of MIH functionality as well as IP mobility functionality. That is, the MN does not need to be participated in any MIH related signaling for handover procedure, which can be consistent with the essential objective of the PMIPv6. The base station with MIH functionality performs handover on behalf of the MN. Therefore, the proposed mechanism can reduce burden and power consumption of MNs with limited resource and battery power. In addition, the analytical evaluation shows that the proposed mechanism can outperform the existing mechanism in terms of handover latency and total number of over-the-air signaling messages. Thus, the proposed mechanism can be expected to reduce the packet loss and the bandwidth consumption of wireless links during handover procedure comparing with the existing mechanism.
本文提出了一种IEEE 802.21媒体独立切换(MIH)功能辅助代理移动IPv6 (PMIPv6)机制,以降低异构无线网络中的切换延迟和信令成本。所提出的机制支持移动节点(MN)的快速垂直切换,无论是否存在MIH功能以及IP移动功能。也就是说,MN不需要参与任何与MIH相关的移交过程信令,这与PMIPv6的基本目标是一致的。具有MIH功能的基站代表MN执行切换。因此,该机制可以在有限的资源和电池电量的情况下减少mnns的负担和功耗。此外,分析评估表明,该机制在切换延迟和空中信令总数方面优于现有机制。因此,与现有机制相比,所提出的机制有望减少无线链路在切换过程中的丢包和带宽消耗。
{"title":"An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling Cost","authors":"P. Kim, Mun-Suck Jang, E. Lee","doi":"10.1109/ITNG.2013.107","DOIUrl":"https://doi.org/10.1109/ITNG.2013.107","url":null,"abstract":"This paper proposes an IEEE 802.21 Media Independent Handover (MIH) functionality assisted Proxy Mobile IPv6 (PMIPv6) mechanism for reducing handover latency and signaling cost in heterogeneous wireless networks. The proposed mechanism comes to support fast vertical handover for the mobile node (MN) irrespective of the presence or absence of MIH functionality as well as IP mobility functionality. That is, the MN does not need to be participated in any MIH related signaling for handover procedure, which can be consistent with the essential objective of the PMIPv6. The base station with MIH functionality performs handover on behalf of the MN. Therefore, the proposed mechanism can reduce burden and power consumption of MNs with limited resource and battery power. In addition, the analytical evaluation shows that the proposed mechanism can outperform the existing mechanism in terms of handover latency and total number of over-the-air signaling messages. Thus, the proposed mechanism can be expected to reduce the packet loss and the bandwidth consumption of wireless links during handover procedure comparing with the existing mechanism.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Systematic Mapping Study on Architectural Analysis 建筑分析的系统映射研究
C. Catal, Muratcan Atalay
We conduct a Systematic Mapping Study to categorize the primary research papers in architectural analysis. Systematic mapping studies can change the research perspective in an area and they can help to find the ignored researched areas. The objective of this study is to investigate the techniques used in papers on architectural analysis, identify the current trends, and provide suggestions for the future research studies. We search for papers published within the last ten years in the following databases: IEEE Explorer, ACM Digital Library, Science Direct, and Wiley. We conclude that more validation and evaluation research is needed to provide a better foundation for architectural analysis.
我们进行了一项系统的地图研究,对建筑分析的主要研究论文进行了分类。系统制图研究可以改变一个领域的研究视角,有助于发现被忽视的研究领域。本研究的目的是调查建筑分析论文中使用的技术,确定当前的趋势,并为未来的研究提供建议。我们在以下数据库中检索近十年发表的论文:IEEE Explorer, ACM数字图书馆,Science Direct和Wiley。我们得出结论,需要更多的验证和评估研究来为架构分析提供更好的基础。
{"title":"A Systematic Mapping Study on Architectural Analysis","authors":"C. Catal, Muratcan Atalay","doi":"10.1109/ITNG.2013.102","DOIUrl":"https://doi.org/10.1109/ITNG.2013.102","url":null,"abstract":"We conduct a Systematic Mapping Study to categorize the primary research papers in architectural analysis. Systematic mapping studies can change the research perspective in an area and they can help to find the ignored researched areas. The objective of this study is to investigate the techniques used in papers on architectural analysis, identify the current trends, and provide suggestions for the future research studies. We search for papers published within the last ten years in the following databases: IEEE Explorer, ACM Digital Library, Science Direct, and Wiley. We conclude that more validation and evaluation research is needed to provide a better foundation for architectural analysis.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attack Scenario Prediction Methodology 攻击场景预测方法
Seraj Fayyad, C. Meinel
Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.
入侵检测系统能够生成针对网络运行的恶意活动的重要数据。IDS生成的数据存储在IDS数据库中。这些数据代表了针对网络的攻击场景历史。入侵检测系统的主要目标是提高网络防御技术。另外还采用了攻击图等技术来增强网络的防御能力。网络攻击图用于预测攻击者下一步的攻击步骤等目标。在本文中,我们提出了一种实时预测方法来预测最可能的攻击步骤和攻击场景。本文提出的方法得益于对网络的攻击历史和攻击图源数据。它没有相当大的计算过载,如检查攻击计划库。它为并行攻击场景提供并行预测。
{"title":"Attack Scenario Prediction Methodology","authors":"Seraj Fayyad, C. Meinel","doi":"10.1109/ITNG.2013.16","DOIUrl":"https://doi.org/10.1109/ITNG.2013.16","url":null,"abstract":"Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security 自动可变密钥生成的新方法,以达到完美的安全性
R. Goswami, S. K. Chakraborty, A. Bhunia, C. Bhunia
Realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security [1-2]. Automatic Variable Key (AVK) is a novel approach to realize time variant key. In AVK, key is generated for use between the sender and the receiver in using a simple computation technique as proposed by Bhunia [3-5]. The AVK was widely experimented by other researchers that established the superiority of AVK over a single / fixed key [6-10]. In this paper we propose two new techniques for generating time variant key. Our techniques ensure better randomness among the successive two keys so generated.
实现会话间的时变密钥或可变密钥是实现完美安全性的关键挑战[1-2]。自动可变密钥(AVK)是实现时变密钥的一种新方法。在AVK中,使用Bhunia[3-5]提出的一种简单的计算技术生成密钥供发送方和接收方之间使用。其他研究人员对AVK进行了广泛的实验,确定了AVK优于单一/固定密钥[6-10]。本文提出了两种生成时变密钥的新技术。我们的技术确保了这样生成的连续两个密钥之间更好的随机性。
{"title":"New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security","authors":"R. Goswami, S. K. Chakraborty, A. Bhunia, C. Bhunia","doi":"10.1109/ITNG.2013.82","DOIUrl":"https://doi.org/10.1109/ITNG.2013.82","url":null,"abstract":"Realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security [1-2]. Automatic Variable Key (AVK) is a novel approach to realize time variant key. In AVK, key is generated for use between the sender and the receiver in using a simple computation technique as proposed by Bhunia [3-5]. The AVK was widely experimented by other researchers that established the superiority of AVK over a single / fixed key [6-10]. In this paper we propose two new techniques for generating time variant key. Our techniques ensure better randomness among the successive two keys so generated.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm 量子线性系统算法的经典资源和量子资源分析
Jon Inouye
The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.
Harrow, Hassidim和Lloyd的量子算法解决了N个线性方程组,并在一定条件下实现了比经典算法指数级的加速。该算法的优点是需要log(N)而不是N个寄存器。给定一个N x N矩阵A和向量x和b,量子算法寻求找到x使Ax = b。通过将向量b表示为量子态的叠加|b>,量子相位估计用于找到A的相应特征值。应用傅里叶反变换,我们求解出|x>使得|x> = A-1|b>。我们使用量子电路图对算法进行建模,数据量子比特使用Steane编码进行容错量子相位估计。使用神谕式流水线辅助结构提供用于纠错的新辅助。然后我们分析了实现所需的经典资源和量子资源。本案例研究的意义在于研究经典资源和量子资源在实现该算法时如何相互作用。本分析中提出的问题,如使用流水线辅助设备进行容错阶段估计、垃圾收集和为该体系结构准备I/O寄存器,将在未来的研究中进行更详细的探讨。
{"title":"Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm","authors":"Jon Inouye","doi":"10.1109/ITNG.2013.117","DOIUrl":"https://doi.org/10.1109/ITNG.2013.117","url":null,"abstract":"The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining Auto-generated Test Inputs for Test Oracle 为Test Oracle挖掘自动生成的测试输入
Weifeng Xu, Hanlin Wang, Tao Ding
A Search-based test input generator produces a high volume of auto-generated test inputs. However, manually checking a test oracle for these test inputs is impractical due to the lacking of a systematic way to produce corresponding expected results automatically. This paper presents a mining approach to build decision tree models containing the estimated expected results for checking a test oracle. We first choose a subset of the auto-generated test inputs as a training set. Then, we mine the training set to generate a decision tree from which the estimated expected results can be retrieved. For evaluation purpose, we have applied our approach to two legacy examples, Triangle and Next Date. Our controlled experiments have shown that the mining approach is able to generate highly accurate behavioral models and achieve strong fault detectability.
基于搜索的测试输入生成器生成大量自动生成的测试输入。然而,手动检查这些测试输入的测试oracle是不切实际的,因为缺乏一种系统的方法来自动产生相应的预期结果。本文提出了一种挖掘方法来构建包含测试oracle的估计预期结果的决策树模型。我们首先选择自动生成的测试输入的一个子集作为训练集。然后,我们挖掘训练集以生成决策树,从中可以检索到估计的期望结果。出于评估的目的,我们将我们的方法应用于两个遗留示例:Triangle和Next Date。我们的控制实验表明,该方法能够生成高精度的行为模型,并实现较强的故障检测能力。
{"title":"Mining Auto-generated Test Inputs for Test Oracle","authors":"Weifeng Xu, Hanlin Wang, Tao Ding","doi":"10.1109/ITNG.2013.126","DOIUrl":"https://doi.org/10.1109/ITNG.2013.126","url":null,"abstract":"A Search-based test input generator produces a high volume of auto-generated test inputs. However, manually checking a test oracle for these test inputs is impractical due to the lacking of a systematic way to produce corresponding expected results automatically. This paper presents a mining approach to build decision tree models containing the estimated expected results for checking a test oracle. We first choose a subset of the auto-generated test inputs as a training set. Then, we mine the training set to generate a decision tree from which the estimated expected results can be retrieved. For evaluation purpose, we have applied our approach to two legacy examples, Triangle and Next Date. Our controlled experiments have shown that the mining approach is able to generate highly accurate behavioral models and achieve strong fault detectability.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Boundary Value Analysis Tool - Design and Description 边界值分析工具的设计与描述
N. Debnath, Adam Kruger, M. Alexander
The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.
介绍了一种基于边界值分析的软件测试工具的设计和描述。该工具最初使用三个选定函数的说明生成测试用例,然后在这些函数上自动执行测试用例以评估正确性。提出的工具使用三角形、下一个日期和委托函数的实现来进行正确性评估。本文还概述了该工具的潜在应用。
{"title":"A Boundary Value Analysis Tool - Design and Description","authors":"N. Debnath, Adam Kruger, M. Alexander","doi":"10.1109/ITNG.2013.20","DOIUrl":"https://doi.org/10.1109/ITNG.2013.20","url":null,"abstract":"The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait 科威特大学生对社交网站的认知与使用
Samir N. Hamade
Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.
社交网络正日益引起欧美学者和研究人员的关注和兴趣。然而,在这些地区之外,特别是在中东和阿拉伯国家,很少有研究。本文旨在评估科威特大学生对社交网站(SNS)的认知和使用情况,并研究其积极和消极影响。调查结果显示,大学生大量使用Twitter和Facebook,他们浏览网站的频率高于发帖的频率。最积极的影响是与家人和朋友的关系更好,更多地参与社会、政治和文化活动。忽视学习/工作和浪费时间是两个主要的缺点。调查结果显示,除了娱乐之外,一些学生缺乏使用社交网络的经验,这证实了教育学生了解社交网络的好处和这些网站上发现的信息质量的必要性。隐私问题也应该提出,因为大多数学生(70%)有不受控制的账户。
{"title":"Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait","authors":"Samir N. Hamade","doi":"10.1109/ITNG.2013.67","DOIUrl":"https://doi.org/10.1109/ITNG.2013.67","url":null,"abstract":"Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia 预测调节性内斜视恶化的眼科医生工具
Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig
The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.
本文所描述的工作将机器学习技术应用于适应性内敛患者的数据库。适应性内斜视是一种眼病,如果不及时治疗会导致失明。肌肉恶化的患者通常需要矫正手术来预防这种情况,因为在这些患者中,侵入性较小的治疗方法往往会失败。医生通常很难事先确定哪些病人会恶化到需要手术的程度。使用学习和修剪方法,对适应性内倾患者进行决策树分析,发现了预测恶化的两个联合变量。这些变量的使用产生了更好的预测,并为领域专家提供了洞察力。
{"title":"An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia","authors":"Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig","doi":"10.1109/ITNG.2013.114","DOIUrl":"https://doi.org/10.1109/ITNG.2013.114","url":null,"abstract":"The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Static and Dynamic Android Anti-virus Strategies 静态和动态Android反病毒策略研究
Yan Ma, M. Sharbaf
Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.
如今,在智能手机的强力推动下,电子商务正在被移动商务所取代。安卓手机、iPhone、黑莓和Windows phone都是典型的智能手机型号。根据comScore[1]的数据,2012年,Android和iphone在美国智能手机市场的份额分别超过50%和31%。由于Android平台是目前最流行的智能手机平台,它是一个开源环境,并且它比Apple Store拥有更多的应用程序,所以本文主要研究Android平台上的反病毒策略。反病毒策略将分为两类,三个样本:静态分析和动态分析。详细介绍了偷渡者,asandbox和Droidbox。接着分析了它们的优点/缺点。该研究报告的重点是为个人、政府机构和私营部门提供Android反病毒策略大纲,并帮助您决定选择哪种反病毒应用程序。
{"title":"Investigation of Static and Dynamic Android Anti-virus Strategies","authors":"Yan Ma, M. Sharbaf","doi":"10.1109/ITNG.2013.62","DOIUrl":"https://doi.org/10.1109/ITNG.2013.62","url":null,"abstract":"Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1