首页 > 最新文献

International Conference on Advances in Computing and Artificial Intelligence最新文献

英文 中文
Wireless machine monitoring embodiment using mobile computing 使用移动计算的无线机器监控实施例
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007093
Bikramjit Singh, S. Puri, Prateek Kesarwani
With the increasing dependence on machines, the accidental and wear and tear costs has also risen, and even in some cases loss of lives also occur, all are due to improper or delayed information retrieval. In this project, our aim is to subside the machine related damages by designing a ubiquitous data acquisition system for various surrounding machines using hand held devices like Smartphone's or PDAs, pre-installed with required application software, and by analyzing the procured data sets (from smart sensors onto the mobiles), decisions are delivered. This framework combines various sensors like temperature, vibration, acoustic, current, voltage sensors etc linked to the machines and a handheld device like mobile. For data acquisition, mobile sets use the wireless telephony or internet services like GPRS or GSM/CDMA or 3G etc or even in built Bluetooth technologies of their mobile sets for shorter range information retrieval from various sensors fitted on machines and analysis is done by comparing the original and best performance data sets stored in a mobile database with the pre-fetched instant data sets and the deviations are calculated using pre-requisites formulae to judge the criticality of the situation. The mobile set is installed with a J2ME application with user-friendly interface, which do the above comparison, data analysis and decisions deliverance in the form of alerts and actions.
随着人们对机器的依赖程度越来越高,意外和磨损的代价也随之上升,甚至在某些情况下也发生了生命损失,都是由于信息检索不当或延迟造成的。在这个项目中,我们的目标是通过为周围的各种机器设计一个无处不在的数据采集系统,使用智能手机或pda等手持设备,预装所需的应用软件,并通过分析获取的数据集(从智能传感器到移动设备),从而减少与机器相关的损害。这个框架结合了各种传感器,如温度、振动、声学、电流、电压传感器等,连接到机器和手持设备,如手机。对于数据采集,移动设备使用无线电话或互联网服务,如GPRS或GSM/CDMA或3G等,甚至在其移动设备内置的蓝牙技术中,从安装在机器上的各种传感器中进行较短范围的信息检索,并通过将存储在移动数据库中的原始和最佳性能数据集与预先获取的即时数据集进行比较来进行分析,并使用先决条件公式计算偏差,以判断情况的严重性。移动设备安装了具有用户友好界面的J2ME应用程序,该应用程序以警报和操作的形式完成上述比较、数据分析和决策交付。
{"title":"Wireless machine monitoring embodiment using mobile computing","authors":"Bikramjit Singh, S. Puri, Prateek Kesarwani","doi":"10.1145/2007052.2007093","DOIUrl":"https://doi.org/10.1145/2007052.2007093","url":null,"abstract":"With the increasing dependence on machines, the accidental and wear and tear costs has also risen, and even in some cases loss of lives also occur, all are due to improper or delayed information retrieval.\u0000 In this project, our aim is to subside the machine related damages by designing a ubiquitous data acquisition system for various surrounding machines using hand held devices like Smartphone's or PDAs, pre-installed with required application software, and by analyzing the procured data sets (from smart sensors onto the mobiles), decisions are delivered.\u0000 This framework combines various sensors like temperature, vibration, acoustic, current, voltage sensors etc linked to the machines and a handheld device like mobile. For data acquisition, mobile sets use the wireless telephony or internet services like GPRS or GSM/CDMA or 3G etc or even in built Bluetooth technologies of their mobile sets for shorter range information retrieval from various sensors fitted on machines and analysis is done by comparing the original and best performance data sets stored in a mobile database with the pre-fetched instant data sets and the deviations are calculated using pre-requisites formulae to judge the criticality of the situation. The mobile set is installed with a J2ME application with user-friendly interface, which do the above comparison, data analysis and decisions deliverance in the form of alerts and actions.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116287720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured routing over MANET with power management 安全路由在MANET与电源管理
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007081
A. Kush, Sunil Taneja
Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.
移动自组织网络(MANET)是一种无线移动节点的集合,无需任何固定的网络基础设施即可相互通信。由于该网络中的节点是移动的,因此安全性和功率效率是该领域的主要关注点。本文试图将这些安全和功率因素结合起来,以实现更可靠的路由。此类别中的大多数协议要么包含安全功能,要么考虑功率因素。在这项研究中,没有现有的方案将这两个因素结合起来看结果。合法的网络用户和恶意的攻击者都可以访问临时环境。特殊环境具有功率因数的约束。拟议的方案旨在将这两个因素纳入现有协议。在网络模拟器(2.34版)上进行了仿真实验,并使用分组传输分数和相对于速度和暂停时间的平均端到端延迟计算了结果。该研究将有助于提高协议抗攻击的鲁棒性,并实现功率因数以实现路由协议中的稳定路由。
{"title":"Secured routing over MANET with power management","authors":"A. Kush, Sunil Taneja","doi":"10.1145/2007052.2007081","DOIUrl":"https://doi.org/10.1145/2007052.2007081","url":null,"abstract":"Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"73 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion detection system using honeypots and swarm intelligence 采用蜜罐和群体智能的入侵检测系统
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007060
Gurdip Kaur, Meenu Khurana, Monika Sethi
As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator. Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled. In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.
随着网络和Internet流量的增加和规模的增大,为了减少入侵检测和诊断所需的开销,对入侵检测的需求日益增长,这使得公共服务器越来越容易受到未经授权的访问和入侵。除了为客户端维护低延迟和低性能之外,过滤未经授权的访问已成为服务器管理员的主要关注点之一。蜜罐是为监视和记录探测、攻击或危害它们的实体的活动而设置的诱饵计算机资源。根据定义,蜜罐上的活动可以被认为是可疑的,因为良性用户与这些系统交互没有任何意义。蜜罐有许多形状和大小;示例包括数据库中的虚拟项、低交互网络组件(如预配置的流量接收器)或具有实际操作系统和服务的完全交互主机。蜜罐易于使用,捕获所需的信息,主要用于企业公司保护其网络免受在线黑客和未经授权的用户的攻击。大多数蜜罐都是在防火墙程序中安装和配置的,这样可以更好地控制它们。在本文中,我们提出了向前和向后蚂蚁(群体智能)以及蜜罐的概念,通过遵循预先建立的负载平衡器和入侵检测系统的概念来检测网络入侵。
{"title":"Intrusion detection system using honeypots and swarm intelligence","authors":"Gurdip Kaur, Meenu Khurana, Monika Sethi","doi":"10.1145/2007052.2007060","DOIUrl":"https://doi.org/10.1145/2007052.2007060","url":null,"abstract":"As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator.\u0000 Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled.\u0000 In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed smart camera network and mobile devices 分布式智能摄像头网络和移动设备
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007057
Sumit Kumar, Santosh Kumar, Sukumar Nandi
Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing architectures to analyze imagery from physically distributed cameras. Smart Camera gives an opportunity to capture image with high approximation, less computations, lower bandwidth wastage and real time results. Mobile devices can connect to the Smart Camera Network in distributed manner [2]. We demonstrate the system with a real time application for Smart Camera Network and Mobile Devices.
智能摄像头网络[4]使我们能够通过配备摄像头传感器的嵌入式计算设备的通信网络通道来检测、分类和跟踪视觉事件。分布式智能摄像机[2]使用分布式计算架构来分析物理分布摄像机的图像。智能相机提供了一个机会,以高近似值捕获图像,更少的计算,更低的带宽浪费和实时结果。移动设备可以以分布式的方式接入智能摄像机网络[2]。最后以智能摄像机网络和移动设备的实时应用为例进行了系统演示。
{"title":"Distributed smart camera network and mobile devices","authors":"Sumit Kumar, Santosh Kumar, Sukumar Nandi","doi":"10.1145/2007052.2007057","DOIUrl":"https://doi.org/10.1145/2007052.2007057","url":null,"abstract":"Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing architectures to analyze imagery from physically distributed cameras. Smart Camera gives an opportunity to capture image with high approximation, less computations, lower bandwidth wastage and real time results. Mobile devices can connect to the Smart Camera Network in distributed manner [2]. We demonstrate the system with a real time application for Smart Camera Network and Mobile Devices.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Educational web sites accessibility design model 教育网站无障碍设计模型
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007055
J. Manhas
Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire services from web sites. In the design process, enough attention has not been given to educational websites accessibility. After explaining the need of web engineering in websites design, the relation and the importance of web accessibility are studied and different kinds of vulnerable groups are identified. This paper introduces status of educational web accessibility and put forward the concept of educational web accessibility design. Firstly, role of web engineering in web accessibility is discussed; secondly, proposes five fundamental principals as different types of online learners and their relations with educational websites accessibility; thirdly, Function, design concept and seven principals of universal design are related with educational websites accessibility; fourthly, Design model of educational web accessibility is studied; lastly, it gives out basic design steps in designing accessible educational websites or in the end authors integrates the web accessibility into design process by using top down approach. Through these efforts of web engineering, design concept, principles and model of educational web accessibility, the levels of educational web accessibility will be improved.
网站无障碍是信息社会保障人人平等获取信息权利的基本要求。如今,所有的弱势群体都应该能够从网站上获取信息和服务,这已经成为一项强制性的规定。在设计过程中,教育类网站的可访问性没有得到足够的重视。在阐述了网页工程在网站设计中的必要性之后,研究了网页可访问性的关系和重要性,并对不同类型的弱势群体进行了识别。本文介绍了教育网站无障碍的现状,提出了教育网站无障碍设计的概念。首先,讨论了web工程在网页可访问性中的作用;其次,提出了不同类型在线学习者的五大基本原则及其与教育网站可访问性的关系;第三,功能、设计理念和通用设计七大原则与教育网站可访问性相关;第四,研究了教育网站无障碍设计模型;最后给出了无障碍教育网站设计的基本设计步骤,最后采用自顶向下的方法将网站无障碍设计融入到设计过程中。通过网络工程、教育无障碍网页的设计理念、设计原则和设计模式等方面的努力,提高教育无障碍网页的水平。
{"title":"Educational web sites accessibility design model","authors":"J. Manhas","doi":"10.1145/2007052.2007055","DOIUrl":"https://doi.org/10.1145/2007052.2007055","url":null,"abstract":"Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire services from web sites. In the design process, enough attention has not been given to educational websites accessibility. After explaining the need of web engineering in websites design, the relation and the importance of web accessibility are studied and different kinds of vulnerable groups are identified. This paper introduces status of educational web accessibility and put forward the concept of educational web accessibility design. Firstly, role of web engineering in web accessibility is discussed; secondly, proposes five fundamental principals as different types of online learners and their relations with educational websites accessibility; thirdly, Function, design concept and seven principals of universal design are related with educational websites accessibility; fourthly, Design model of educational web accessibility is studied; lastly, it gives out basic design steps in designing accessible educational websites or in the end authors integrates the web accessibility into design process by using top down approach. Through these efforts of web engineering, design concept, principles and model of educational web accessibility, the levels of educational web accessibility will be improved.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated taxi/cab system using A* algorithm 采用A*算法的自动出租车/出租车系统
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007056
Santosh Kumar, Sumit Kumar
An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and monitoring. Planning, Acting and Learning concepts of mobile robotics are requisite to implement the Automated Taxi System. In this paper we also concern with Localization and Mapping concept of Mobile Robotic to build up a map within an unknown environment and at the same time keeping of their current positions. The Proposed Path Navigation System (Automated Taxi System) is using A*(A-Star) algorithm to find the shortest path between source and destination. The proposed system is implemented using the Lego Mindstrom NXT platform and LeJOS NXJ (The programming language). We furthermore proposed another Heuristics based algorithm to accomplish the same objective that is rapid to implement and perform.
一种采用多智能体方法的出租车自动调度系统[8][10]旨在以分布式方式为所有乘客提供服务。自动出租车系统是一种基于位置的交通传感方法,包含分布式出租车预订和监控。计划,行动和学习概念的移动机器人是必要的,以实现自动出租车系统。本文还讨论了移动机器人的定位和映射概念,以在未知环境中建立地图,同时保持其当前位置。本文提出的路径导航系统(自动出租车系统)使用A*(A- star)算法来寻找源和目的地之间的最短路径。该系统采用乐高Mindstrom NXT平台和LeJOS NXJ(编程语言)实现。我们进一步提出了另一种基于启发式的算法来实现相同的目标,该算法实现和执行速度快。
{"title":"Automated taxi/cab system using A* algorithm","authors":"Santosh Kumar, Sumit Kumar","doi":"10.1145/2007052.2007056","DOIUrl":"https://doi.org/10.1145/2007052.2007056","url":null,"abstract":"An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and monitoring. Planning, Acting and Learning concepts of mobile robotics are requisite to implement the Automated Taxi System. In this paper we also concern with Localization and Mapping concept of Mobile Robotic to build up a map within an unknown environment and at the same time keeping of their current positions. The Proposed Path Navigation System (Automated Taxi System) is using A*(A-Star) algorithm to find the shortest path between source and destination. The proposed system is implemented using the Lego Mindstrom NXT platform and LeJOS NXJ (The programming language). We furthermore proposed another Heuristics based algorithm to accomplish the same objective that is rapid to implement and perform.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy logic based decision support system for loan risk assessment 基于模糊逻辑的贷款风险评估决策支持系统
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007089
Sangeet Kumar, Nitin Bhatia, Namarta Kapoor
This paper is concerned with risks associated with the loan Risk analysis and related adaptation strategies have grown in importance and complexity during last years. The large amount of data and information that needs to be handled and integrated requires specific methodologies and tools. So selecting a new loan applicant is a important issue of a financial organizations or Banks. There are so many different factors which effect on the selection of applicant who apply for loan. So, it's a problem for Banks and other private financers to choose right applicant so that minimum risk involved during loan process using fuzzy logic. We control this problem in quicker and cheapest way using knowledge and experience of experts which are involved in this process and having knowledge about this field. This paper provides risk analysis based on fuzzy inference system. And provide GUI based interface tool regarding different parameters of an applicant which effect loan risk assessment. The analysis of experimental results of different applicants checks the correctness and consistency of decision Support system for correct decision making.
本文关注的是与贷款相关的风险,风险分析和相关的适应策略在过去几年中变得越来越重要和复杂。需要处理和集成的大量数据和信息需要特定的方法和工具。因此,选择一个新的贷款申请人是金融机构或银行的一个重要问题。有很多不同的因素影响到选择申请贷款的申请人。因此,银行和其他私人融资机构在使用模糊逻辑的情况下选择合适的申请人以使贷款过程中的风险最小化是一个问题。我们利用参与这一过程的专家的知识和经验,以更快、最便宜的方式控制这个问题,并掌握这一领域的知识。本文提出了基于模糊推理系统的风险分析方法。并针对影响贷款风险评估的申请人的不同参数提供基于GUI的界面工具。通过对不同申请人实验结果的分析,验证了决策支持系统的正确性和一致性,从而实现正确的决策。
{"title":"Fuzzy logic based decision support system for loan risk assessment","authors":"Sangeet Kumar, Nitin Bhatia, Namarta Kapoor","doi":"10.1145/2007052.2007089","DOIUrl":"https://doi.org/10.1145/2007052.2007089","url":null,"abstract":"This paper is concerned with risks associated with the loan Risk analysis and related adaptation strategies have grown in importance and complexity during last years. The large amount of data and information that needs to be handled and integrated requires specific methodologies and tools. So selecting a new loan applicant is a important issue of a financial organizations or Banks. There are so many different factors which effect on the selection of applicant who apply for loan. So, it's a problem for Banks and other private financers to choose right applicant so that minimum risk involved during loan process using fuzzy logic. We control this problem in quicker and cheapest way using knowledge and experience of experts which are involved in this process and having knowledge about this field. This paper provides risk analysis based on fuzzy inference system. And provide GUI based interface tool regarding different parameters of an applicant which effect loan risk assessment. The analysis of experimental results of different applicants checks the correctness and consistency of decision Support system for correct decision making.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial intelligent firewall 人工智能防火墙
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007094
A. Mishra, Abhishek Agrawal, R. Ranjan
Firewalls are now an integral part of network security. An intelligent firewall that prevents unauthorized access to a system has been developed. Artificial intelligence applications are uniquely suited for the ever-changing, ever-evolving world of network security. Typical firewalls are only as good as the information provided by the Network Administrator. A new type of attack creates vulnerabilities, which a static firewall does not have the ability to avoid without human direction. An AI-managed firewall service, however, can protect a computer network from known and future threats. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.
防火墙现在是网络安全的一个组成部分。开发了一种智能防火墙,可以防止对系统的未经授权的访问。人工智能应用非常适合不断变化、不断发展的网络安全世界。典型的防火墙仅与网络管理员提供的信息一样好。一种新的攻击会产生漏洞,如果没有人为的指导,静态防火墙无法避免这些漏洞。然而,人工智能管理的防火墙服务可以保护计算机网络免受已知和未来的威胁。本文报告了不同安全技术集成方面的研究进展。该项目的主要目的是将智能检测引擎集成到防火墙中。智能检测引擎不仅旨在检测传统入侵防御系统中的异常网络流量,还将检测表明存在病毒数据的异常结构数据包。我们将在本文中报告智能防火墙的概念,该防火墙包含针对潜在恶意数据包的智能检测引擎。
{"title":"Artificial intelligent firewall","authors":"A. Mishra, Abhishek Agrawal, R. Ranjan","doi":"10.1145/2007052.2007094","DOIUrl":"https://doi.org/10.1145/2007052.2007094","url":null,"abstract":"Firewalls are now an integral part of network security. An intelligent firewall that prevents unauthorized access to a system has been developed. Artificial intelligence applications are uniquely suited for the ever-changing, ever-evolving world of network security. Typical firewalls are only as good as the information provided by the Network Administrator. A new type of attack creates vulnerabilities, which a static firewall does not have the ability to avoid without human direction. An AI-managed firewall service, however, can protect a computer network from known and future threats. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security threats to mobile agents 移动代理面临的安全威胁
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007098
Snehi Jyoti, Snehi Manish, Sudha Goyal
Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task. As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.
移动代理是一种以自治方式执行的软件抽象(进程),能够暂停其在主机上的执行,从一个启用代理的主机移动到另一个主机,并在目标节点上继续执行。通过这种方式,移动代理可以跨不同节点在松散耦合的分布式环境中迁移,其数据完整地执行预期的任务。由于目标的实现是通过将移动代理迁移到联网计算机中来实现的,这增加了安全风险。本文确定了移动代理的应用以及对系统的威胁和一般安全问题。在本文中,我们还提出了通过实现安全目标来实现移动代理的身份验证和授权的安全层。
{"title":"Security threats to mobile agents","authors":"Snehi Jyoti, Snehi Manish, Sudha Goyal","doi":"10.1145/2007052.2007098","DOIUrl":"https://doi.org/10.1145/2007052.2007098","url":null,"abstract":"Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task.\u0000 As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125264861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient job scheduling algorithm for grid computing 网格计算中一种高效的作业调度算法
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007097
Sarpreet Singh, R. K. Bawa
The emerging computational grid infrastructure consists of heterogeneous resource in widely distributed autonomous domain, which makes resources scheduling even more challenging. The most common objective function of task scheduling problem is makespan. In this paper, I have proposed an efficient Job scheduling algorithm for the grid environment so that the jobs are executed in minimum time and also all nodes of grid execute equal load relative to their executing power. This technique fetches the jobs from the job queue that is ready to execute and assign these jobs to the best nodes of the grid.
新兴的计算网格基础设施由分布广泛的自治域中的异构资源组成,这给资源调度带来了更大的挑战。任务调度问题中最常见的目标函数是最大时间。本文针对网格环境,提出了一种高效的作业调度算法,使作业在最短的时间内执行,并使网格的所有节点执行相对于其执行能力的负载相等。该技术从准备执行的作业队列中获取作业,并将这些作业分配给网格的最佳节点。
{"title":"An efficient job scheduling algorithm for grid computing","authors":"Sarpreet Singh, R. K. Bawa","doi":"10.1145/2007052.2007097","DOIUrl":"https://doi.org/10.1145/2007052.2007097","url":null,"abstract":"The emerging computational grid infrastructure consists of heterogeneous resource in widely distributed autonomous domain, which makes resources scheduling even more challenging. The most common objective function of task scheduling problem is makespan. In this paper, I have proposed an efficient Job scheduling algorithm for the grid environment so that the jobs are executed in minimum time and also all nodes of grid execute equal load relative to their executing power. This technique fetches the jobs from the job queue that is ready to execute and assign these jobs to the best nodes of the grid.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122920031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Advances in Computing and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1