This paper proposes an IEEE 802.21 Media Independent Handover (MIH) functionality assisted Proxy Mobile IPv6 (PMIPv6) mechanism for reducing handover latency and signaling cost in heterogeneous wireless networks. The proposed mechanism comes to support fast vertical handover for the mobile node (MN) irrespective of the presence or absence of MIH functionality as well as IP mobility functionality. That is, the MN does not need to be participated in any MIH related signaling for handover procedure, which can be consistent with the essential objective of the PMIPv6. The base station with MIH functionality performs handover on behalf of the MN. Therefore, the proposed mechanism can reduce burden and power consumption of MNs with limited resource and battery power. In addition, the analytical evaluation shows that the proposed mechanism can outperform the existing mechanism in terms of handover latency and total number of over-the-air signaling messages. Thus, the proposed mechanism can be expected to reduce the packet loss and the bandwidth consumption of wireless links during handover procedure comparing with the existing mechanism.
{"title":"An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling Cost","authors":"P. Kim, Mun-Suck Jang, E. Lee","doi":"10.1109/ITNG.2013.107","DOIUrl":"https://doi.org/10.1109/ITNG.2013.107","url":null,"abstract":"This paper proposes an IEEE 802.21 Media Independent Handover (MIH) functionality assisted Proxy Mobile IPv6 (PMIPv6) mechanism for reducing handover latency and signaling cost in heterogeneous wireless networks. The proposed mechanism comes to support fast vertical handover for the mobile node (MN) irrespective of the presence or absence of MIH functionality as well as IP mobility functionality. That is, the MN does not need to be participated in any MIH related signaling for handover procedure, which can be consistent with the essential objective of the PMIPv6. The base station with MIH functionality performs handover on behalf of the MN. Therefore, the proposed mechanism can reduce burden and power consumption of MNs with limited resource and battery power. In addition, the analytical evaluation shows that the proposed mechanism can outperform the existing mechanism in terms of handover latency and total number of over-the-air signaling messages. Thus, the proposed mechanism can be expected to reduce the packet loss and the bandwidth consumption of wireless links during handover procedure comparing with the existing mechanism.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We conduct a Systematic Mapping Study to categorize the primary research papers in architectural analysis. Systematic mapping studies can change the research perspective in an area and they can help to find the ignored researched areas. The objective of this study is to investigate the techniques used in papers on architectural analysis, identify the current trends, and provide suggestions for the future research studies. We search for papers published within the last ten years in the following databases: IEEE Explorer, ACM Digital Library, Science Direct, and Wiley. We conclude that more validation and evaluation research is needed to provide a better foundation for architectural analysis.
{"title":"A Systematic Mapping Study on Architectural Analysis","authors":"C. Catal, Muratcan Atalay","doi":"10.1109/ITNG.2013.102","DOIUrl":"https://doi.org/10.1109/ITNG.2013.102","url":null,"abstract":"We conduct a Systematic Mapping Study to categorize the primary research papers in architectural analysis. Systematic mapping studies can change the research perspective in an area and they can help to find the ignored researched areas. The objective of this study is to investigate the techniques used in papers on architectural analysis, identify the current trends, and provide suggestions for the future research studies. We search for papers published within the last ten years in the following databases: IEEE Explorer, ACM Digital Library, Science Direct, and Wiley. We conclude that more validation and evaluation research is needed to provide a better foundation for architectural analysis.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.
{"title":"Attack Scenario Prediction Methodology","authors":"Seraj Fayyad, C. Meinel","doi":"10.1109/ITNG.2013.16","DOIUrl":"https://doi.org/10.1109/ITNG.2013.16","url":null,"abstract":"Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Goswami, S. K. Chakraborty, A. Bhunia, C. Bhunia
Realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security [1-2]. Automatic Variable Key (AVK) is a novel approach to realize time variant key. In AVK, key is generated for use between the sender and the receiver in using a simple computation technique as proposed by Bhunia [3-5]. The AVK was widely experimented by other researchers that established the superiority of AVK over a single / fixed key [6-10]. In this paper we propose two new techniques for generating time variant key. Our techniques ensure better randomness among the successive two keys so generated.
{"title":"New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security","authors":"R. Goswami, S. K. Chakraborty, A. Bhunia, C. Bhunia","doi":"10.1109/ITNG.2013.82","DOIUrl":"https://doi.org/10.1109/ITNG.2013.82","url":null,"abstract":"Realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security [1-2]. Automatic Variable Key (AVK) is a novel approach to realize time variant key. In AVK, key is generated for use between the sender and the receiver in using a simple computation technique as proposed by Bhunia [3-5]. The AVK was widely experimented by other researchers that established the superiority of AVK over a single / fixed key [6-10]. In this paper we propose two new techniques for generating time variant key. Our techniques ensure better randomness among the successive two keys so generated.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.
Harrow, Hassidim和Lloyd的量子算法解决了N个线性方程组,并在一定条件下实现了比经典算法指数级的加速。该算法的优点是需要log(N)而不是N个寄存器。给定一个N x N矩阵A和向量x和b,量子算法寻求找到x使Ax = b。通过将向量b表示为量子态的叠加|b>,量子相位估计用于找到A的相应特征值。应用傅里叶反变换,我们求解出|x>使得|x> = A-1|b>。我们使用量子电路图对算法进行建模,数据量子比特使用Steane编码进行容错量子相位估计。使用神谕式流水线辅助结构提供用于纠错的新辅助。然后我们分析了实现所需的经典资源和量子资源。本案例研究的意义在于研究经典资源和量子资源在实现该算法时如何相互作用。本分析中提出的问题,如使用流水线辅助设备进行容错阶段估计、垃圾收集和为该体系结构准备I/O寄存器,将在未来的研究中进行更详细的探讨。
{"title":"Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm","authors":"Jon Inouye","doi":"10.1109/ITNG.2013.117","DOIUrl":"https://doi.org/10.1109/ITNG.2013.117","url":null,"abstract":"The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Search-based test input generator produces a high volume of auto-generated test inputs. However, manually checking a test oracle for these test inputs is impractical due to the lacking of a systematic way to produce corresponding expected results automatically. This paper presents a mining approach to build decision tree models containing the estimated expected results for checking a test oracle. We first choose a subset of the auto-generated test inputs as a training set. Then, we mine the training set to generate a decision tree from which the estimated expected results can be retrieved. For evaluation purpose, we have applied our approach to two legacy examples, Triangle and Next Date. Our controlled experiments have shown that the mining approach is able to generate highly accurate behavioral models and achieve strong fault detectability.
{"title":"Mining Auto-generated Test Inputs for Test Oracle","authors":"Weifeng Xu, Hanlin Wang, Tao Ding","doi":"10.1109/ITNG.2013.126","DOIUrl":"https://doi.org/10.1109/ITNG.2013.126","url":null,"abstract":"A Search-based test input generator produces a high volume of auto-generated test inputs. However, manually checking a test oracle for these test inputs is impractical due to the lacking of a systematic way to produce corresponding expected results automatically. This paper presents a mining approach to build decision tree models containing the estimated expected results for checking a test oracle. We first choose a subset of the auto-generated test inputs as a training set. Then, we mine the training set to generate a decision tree from which the estimated expected results can be retrieved. For evaluation purpose, we have applied our approach to two legacy examples, Triangle and Next Date. Our controlled experiments have shown that the mining approach is able to generate highly accurate behavioral models and achieve strong fault detectability.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.
{"title":"A Boundary Value Analysis Tool - Design and Description","authors":"N. Debnath, Adam Kruger, M. Alexander","doi":"10.1109/ITNG.2013.20","DOIUrl":"https://doi.org/10.1109/ITNG.2013.20","url":null,"abstract":"The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.
{"title":"Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait","authors":"Samir N. Hamade","doi":"10.1109/ITNG.2013.67","DOIUrl":"https://doi.org/10.1109/ITNG.2013.67","url":null,"abstract":"Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.
{"title":"An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia","authors":"Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig","doi":"10.1109/ITNG.2013.114","DOIUrl":"https://doi.org/10.1109/ITNG.2013.114","url":null,"abstract":"The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.
{"title":"Investigation of Static and Dynamic Android Anti-virus Strategies","authors":"Yan Ma, M. Sharbaf","doi":"10.1109/ITNG.2013.62","DOIUrl":"https://doi.org/10.1109/ITNG.2013.62","url":null,"abstract":"Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}