Issa M. Khalil, Abdallah Khreishah, S. Bouktif, Azeem Ahmad
The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.
{"title":"Security Concerns in Cloud Computing","authors":"Issa M. Khalil, Abdallah Khreishah, S. Bouktif, Azeem Ahmad","doi":"10.1109/ITNG.2013.127","DOIUrl":"https://doi.org/10.1109/ITNG.2013.127","url":null,"abstract":"The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jacinto, Tatiana Martins Almeri, Etiene Lamas, L. Dias, A. Cunha
In recent years, interdisciplinarity has represented one of the most widely used and encouraged teaching practices among educators. This practice has generated a promising expectation of success when applied to undergraduate programs. However, its implementation requires dedication and effort from both students and professors. Through a case study, this paper promotes an analysis about this issue and describes some social games as final product from an interdisciplinary case study, named Project Differences.
{"title":"Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program","authors":"A. Jacinto, Tatiana Martins Almeri, Etiene Lamas, L. Dias, A. Cunha","doi":"10.1109/ITNG.2013.46","DOIUrl":"https://doi.org/10.1109/ITNG.2013.46","url":null,"abstract":"In recent years, interdisciplinarity has represented one of the most widely used and encouraged teaching practices among educators. This practice has generated a promising expectation of success when applied to undergraduate programs. However, its implementation requires dedication and effort from both students and professors. Through a case study, this paper promotes an analysis about this issue and describes some social games as final product from an interdisciplinary case study, named Project Differences.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network on chip (NoC) provides a network-based interconnect infrastructure that facilitates the communications among a slew of function cores in a modern System-on-chip (SoC) design. Apart from topology, switching technique and routing strategy adopted in an NoC, flow control scheme that regulates the packet injection rates is another determining factor that impacts the NoC efficiency. In this paper, we propose a Feedback-Based end-to-end congestion control scheme that supports Wireless NoC to make adjustment automatically' upon receiving a feedback message, the source node will adjust its packet size and transmission rate accordingly. Besides, an arbitration optimization strategy, fast-forward scheme is imported to assign higher priority to the downstream flits at the same input port and to the same next output port, thus lighten the resource waste caused by the rest communication tasks. Finally, simulation results indicate the superiority.
{"title":"Flow Control Mechanism for Wireless Network-on-Chip","authors":"Ling Wang, Zhen Wang, Yingtao Jiang","doi":"10.1109/ITNG.2013.81","DOIUrl":"https://doi.org/10.1109/ITNG.2013.81","url":null,"abstract":"Network on chip (NoC) provides a network-based interconnect infrastructure that facilitates the communications among a slew of function cores in a modern System-on-chip (SoC) design. Apart from topology, switching technique and routing strategy adopted in an NoC, flow control scheme that regulates the packet injection rates is another determining factor that impacts the NoC efficiency. In this paper, we propose a Feedback-Based end-to-end congestion control scheme that supports Wireless NoC to make adjustment automatically' upon receiving a feedback message, the source node will adjust its packet size and transmission rate accordingly. Besides, an arbitration optimization strategy, fast-forward scheme is imported to assign higher priority to the downstream flits at the same input port and to the same next output port, thus lighten the resource waste caused by the rest communication tasks. Finally, simulation results indicate the superiority.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sawn softwood timber is used as a structural component in house walls and roofs. Consequently, the consumption trends generally follow those of the housing industry. Therefore, Government imposes tough quality control and quality assurance on the timber industry to grantee product standard meets the specifications in building industry. Capability Analysis on the timber product plays an important role in assessing the capability of the timber in meeting the market functionality requirements. Two characteristics continuously monitored are the Modulus of Elasticity MOE and the Modulus of Rupture MOR. In this paper, we analyse the data collected from three different mills located in three different states based on both, the government recommended Specification Limits and the Natural Statistical Specification Limits. The analyses show that the government tough recommended Specification Limits results in many timbers to be downgraded.
{"title":"Capability Analysis for Modulus of Elasticity and Modulus of Rupture","authors":"M. Abdollahian","doi":"10.1109/ITNG.2013.73","DOIUrl":"https://doi.org/10.1109/ITNG.2013.73","url":null,"abstract":"Sawn softwood timber is used as a structural component in house walls and roofs. Consequently, the consumption trends generally follow those of the housing industry. Therefore, Government imposes tough quality control and quality assurance on the timber industry to grantee product standard meets the specifications in building industry. Capability Analysis on the timber product plays an important role in assessing the capability of the timber in meeting the market functionality requirements. Two characteristics continuously monitored are the Modulus of Elasticity MOE and the Modulus of Rupture MOR. In this paper, we analyse the data collected from three different mills located in three different states based on both, the government recommended Specification Limits and the Natural Statistical Specification Limits. The analyses show that the government tough recommended Specification Limits results in many timbers to be downgraded.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bluetooth provides short range low power wireless communication popularly between laptops, cellular phones and media devices. The original security measurement for Bluetooth looks somewhat inadequate today to meet many important security requirements. In this paper a public key technology based key distribution for Bluetooth is proposed. Taking advantage of `RSA for paranoids', the proposed method makes it possible for low-power and low computational capability embedded microprocessor to compute public-key technology based key distribution in reasonably short time. It is showed that the proposed method clearly has speed advantage when compared to the recent work on Bluetooth key exchange using Diffie-Hellman technology. The security of the proposed scheme against various attacks, including Gilbert's side-channel attack, is also addressed.
{"title":"Public-Key Based Efficient Key Distribution in Bluetooth","authors":"S. Rahman, Yiruo He, Huapeng Wu","doi":"10.1109/ITNG.2013.109","DOIUrl":"https://doi.org/10.1109/ITNG.2013.109","url":null,"abstract":"Bluetooth provides short range low power wireless communication popularly between laptops, cellular phones and media devices. The original security measurement for Bluetooth looks somewhat inadequate today to meet many important security requirements. In this paper a public key technology based key distribution for Bluetooth is proposed. Taking advantage of `RSA for paranoids', the proposed method makes it possible for low-power and low computational capability embedded microprocessor to compute public-key technology based key distribution in reasonably short time. It is showed that the proposed method clearly has speed advantage when compared to the recent work on Bluetooth key exchange using Diffie-Hellman technology. The security of the proposed scheme against various attacks, including Gilbert's side-channel attack, is also addressed.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human gait walking skeleton model is proposed together with its implementation for gender classifications. The proposed model is based on morphological operations and is similar to the conventional skeleton model which allows calculations of joint angles of human body. Also gender classification method based on the proposed human gait walking skeleton model is proposed. Through experiments with the Class B dataset of Chinese Academy of Sciences (CASIA) silhouettes, it is confirmed that the proposed gender classification method utilizing human gait walking skeleton model allows discrimination between left and right legs even if a single camera acquired image is used. It is also confirmed that the proposed method allows estimation of joint angles accurately together with gender classification with high percent correct classification of 85.33% (it is 11.8% better classification accuracy comparing to the existing method).
{"title":"Gender Classification with Human Gait Based on Skeleton Model","authors":"K. Arai, Rosa Andrie","doi":"10.1109/ITNG.2013.134","DOIUrl":"https://doi.org/10.1109/ITNG.2013.134","url":null,"abstract":"Human gait walking skeleton model is proposed together with its implementation for gender classifications. The proposed model is based on morphological operations and is similar to the conventional skeleton model which allows calculations of joint angles of human body. Also gender classification method based on the proposed human gait walking skeleton model is proposed. Through experiments with the Class B dataset of Chinese Academy of Sciences (CASIA) silhouettes, it is confirmed that the proposed gender classification method utilizing human gait walking skeleton model allows discrimination between left and right legs even if a single camera acquired image is used. It is also confirmed that the proposed method allows estimation of joint angles accurately together with gender classification with high percent correct classification of 85.33% (it is 11.8% better classification accuracy comparing to the existing method).","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, C. Çetinkaya, Sercan Demirci, G. Kardas
There are several successful deployments of peer to peer (P2P) video streaming systems which provide acceptable QoS. Researches on these systems continue to improve the experienced quality by system users. Since received video quality mostly depends on the parent selection, an efficient parent selection algorithm can increase the received video bitrate by peers and provide seamless streaming. In this paper, we propose a novel parent selection method based on reinforcement learning. By the proposed system model, the newly joined peer explores the peers in the system first, and uses this information for its further parent selection actions. We implemented our model on a Cool Streaming-like P2P video streaming system in ns3. Our results indicate that, selected parents by using reinforcement learning approach improve the playback continuity, with respect to parent selection method used by Cool Streaming. Furthermore, reinforcement learning approach helps peers to find more stable parents in case of peer churn.
{"title":"Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming","authors":"Muge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, C. Çetinkaya, Sercan Demirci, G. Kardas","doi":"10.1109/ITNG.2013.89","DOIUrl":"https://doi.org/10.1109/ITNG.2013.89","url":null,"abstract":"There are several successful deployments of peer to peer (P2P) video streaming systems which provide acceptable QoS. Researches on these systems continue to improve the experienced quality by system users. Since received video quality mostly depends on the parent selection, an efficient parent selection algorithm can increase the received video bitrate by peers and provide seamless streaming. In this paper, we propose a novel parent selection method based on reinforcement learning. By the proposed system model, the newly joined peer explores the peers in the system first, and uses this information for its further parent selection actions. We implemented our model on a Cool Streaming-like P2P video streaming system in ns3. Our results indicate that, selected parents by using reinforcement learning approach improve the playback continuity, with respect to parent selection method used by Cool Streaming. Furthermore, reinforcement learning approach helps peers to find more stable parents in case of peer churn.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the unique characteristics of 'fatigue' in the context of use of social networks to stay socially connected. Guided by literature on 'fatigue' from within the domains of clinical and occupational studies, the paper uses a combination of in-depth interviews and individual activity logs gathered from members of a selected Facebook community to investigate social network fatigue. Characteristics of the phenomenon are culled from individual user experiences giving rise to negative emotions and/ or a change in activity patterns in the course of use of social networks, so as to derive a working definition of fatigue in the context.
{"title":"Characteristics of Social Network Fatigue","authors":"T. Ravindran, A. Chua, D. Goh","doi":"10.1109/ITNG.2013.66","DOIUrl":"https://doi.org/10.1109/ITNG.2013.66","url":null,"abstract":"This paper examines the unique characteristics of 'fatigue' in the context of use of social networks to stay socially connected. Guided by literature on 'fatigue' from within the domains of clinical and occupational studies, the paper uses a combination of in-depth interviews and individual activity logs gathered from members of a selected Facebook community to investigate social network fatigue. Characteristics of the phenomenon are culled from individual user experiences giving rise to negative emotions and/ or a change in activity patterns in the course of use of social networks, so as to derive a working definition of fatigue in the context.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126933598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research investigates how to discover associated services based on the concept of service cooperation. The goal is to provide clues of marketing campaign among services to companies. This study is used to solve the problem by taking into account associated services simultaneously in the example of Las Vegas. The results show the feasibility of service cooperation from different domain in Las Vegas. In addition, our approach also help travel agency or backpacker organize the trip and service companies to work together to gain more profits.
{"title":"A Two-Step Approach for Mining Service Cooperation","authors":"Ling-Yao Huang, Wei-Lun Chang","doi":"10.1109/ITNG.2013.116","DOIUrl":"https://doi.org/10.1109/ITNG.2013.116","url":null,"abstract":"This research investigates how to discover associated services based on the concept of service cooperation. The goal is to provide clues of marketing campaign among services to companies. This study is used to solve the problem by taking into account associated services simultaneously in the example of Las Vegas. The results show the feasibility of service cooperation from different domain in Las Vegas. In addition, our approach also help travel agency or backpacker organize the trip and service companies to work together to gain more profits.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software testing is one of the most important phases in development of software. Software testing detects faults in software and ensures quality. Software testing can be performed at unit, integration, or system level. Integration testing tests the interactions of different components, when they are integrated together in specific application, for the smooth functionality of software system. Coupling based testing is an integration testing approach that is based upon coupling relationships that exist among different variables across different call sites in functions. Different types of coupling exist between variables across different call sites. Up until now, test data generation approaches deal only unit level testing. There is no work for test data generation for coupling based integration testing. In this paper, we have proposed a novel approach for automated test data generation for coupling based integration testing of object oriented programs using genetic algorithm. Our approach takes the coupling path as input, containing different sub paths, and generates the test data using genetic algorithm. We have implemented a prototype tool E-Coup in Java and successfully performed different experiments for the generation of test data. In experiments with this tool, our approach has much better results as compared to random testing.
{"title":"Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches","authors":"Shaukat Ali, A. Nadeem","doi":"10.1109/ITNG.2013.59","DOIUrl":"https://doi.org/10.1109/ITNG.2013.59","url":null,"abstract":"Software testing is one of the most important phases in development of software. Software testing detects faults in software and ensures quality. Software testing can be performed at unit, integration, or system level. Integration testing tests the interactions of different components, when they are integrated together in specific application, for the smooth functionality of software system. Coupling based testing is an integration testing approach that is based upon coupling relationships that exist among different variables across different call sites in functions. Different types of coupling exist between variables across different call sites. Up until now, test data generation approaches deal only unit level testing. There is no work for test data generation for coupling based integration testing. In this paper, we have proposed a novel approach for automated test data generation for coupling based integration testing of object oriented programs using genetic algorithm. Our approach takes the coupling path as input, containing different sub paths, and generates the test data using genetic algorithm. We have implemented a prototype tool E-Coup in Java and successfully performed different experiments for the generation of test data. In experiments with this tool, our approach has much better results as compared to random testing.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}