Ad hoc mobile networks (MANET) vary greatly depending on their application area and environment in which they work. We have presented a brief review of the state of the art security scenario for MANETs and also pinpointed some of the loopholes of the existing intrusion detection systems (IDS) before we proposed a new collaborative algorithm called IDSX. The proposed IDSX offers an extended architecture and is compatible with heterogeneous IDS already deployed in the participating nodes. While maintaining a high level of intrusion detection, the proposed solution virtually eliminates the problem of phantom intrusion detection to a great extent by aggregating the locally generated alerts to keep or discard a suspected intruder in a two step process.
{"title":"IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network","authors":"R. Chaki, N. Chaki","doi":"10.1109/CISIM.2007.38","DOIUrl":"https://doi.org/10.1109/CISIM.2007.38","url":null,"abstract":"Ad hoc mobile networks (MANET) vary greatly depending on their application area and environment in which they work. We have presented a brief review of the state of the art security scenario for MANETs and also pinpointed some of the loopholes of the existing intrusion detection systems (IDS) before we proposed a new collaborative algorithm called IDSX. The proposed IDSX offers an extended architecture and is compatible with heterogeneous IDS already deployed in the participating nodes. While maintaining a high level of intrusion detection, the proposed solution virtually eliminates the problem of phantom intrusion detection to a great extent by aggregating the locally generated alerts to keep or discard a suspected intruder in a two step process.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the main objective is to give a methodology to design hybrid intelligent diagnosis systems for a large field of biomedicine and industrial applications. At first, a brief description on diagnosis tasks in such applications is presented. Second, diagnosis systems are presented. Third, the main steps of hybrid intelligent diagnosis systems are developed, for each step emphasizing problems and suggesting solutions able to ensure the design of hybrid intelligent diagnosis systems with a satisfactory reliability degree. In fact, the main steps discussed are knowledge representation, classification, classifier issued information fusion, and decision-making. Finally, a discussion is given with regard to the suggested methodology.
{"title":"Hybrid Intelligent Diagnosis Systems","authors":"A. Chohra, N. Kanaoui, K. Madani","doi":"10.1109/CISIM.2007.36","DOIUrl":"https://doi.org/10.1109/CISIM.2007.36","url":null,"abstract":"In this paper, the main objective is to give a methodology to design hybrid intelligent diagnosis systems for a large field of biomedicine and industrial applications. At first, a brief description on diagnosis tasks in such applications is presented. Second, diagnosis systems are presented. Third, the main steps of hybrid intelligent diagnosis systems are developed, for each step emphasizing problems and suggesting solutions able to ensure the design of hybrid intelligent diagnosis systems with a satisfactory reliability degree. In fact, the main steps discussed are knowledge representation, classification, classifier issued information fusion, and decision-making. Finally, a discussion is given with regard to the suggested methodology.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A spread spectrum signal recognition can be accomplished by exploiting the particular features of modulation presented in a received signal observed in presence of noise. These modulation features are the result of slight transmitter component variations and acts as an individual signature of a transmitter. The paper describes a spread spectrum signal classification algorithm based on using the Wigner-Ville distribution (WVD), noise reduction procedure with using a two- dimensional filter and the RBF neural network probability density function estimator which extracts the features vector used for the final signal classification. The numerical simulation results for the P4-coded signals are presented.
{"title":"Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function Estimation","authors":"Y. Grishin","doi":"10.1109/CISIM.2007.62","DOIUrl":"https://doi.org/10.1109/CISIM.2007.62","url":null,"abstract":"A spread spectrum signal recognition can be accomplished by exploiting the particular features of modulation presented in a received signal observed in presence of noise. These modulation features are the result of slight transmitter component variations and acts as an individual signature of a transmitter. The paper describes a spread spectrum signal classification algorithm based on using the Wigner-Ville distribution (WVD), noise reduction procedure with using a two- dimensional filter and the RBF neural network probability density function estimator which extracts the features vector used for the final signal classification. The numerical simulation results for the P4-coded signals are presented.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new approach using independent component analysis (ica) and hybrid Flexible Neural Tree (FNT) is put forward for face recognition. To improve the quality of the face images, a series of image pre-processing techniques, which include histogram equalization, edge detection and geometrical transformation are used. The ICA based on Kernel principal component analysis (KPCA) and FastICA is employed to extract features, and the Hybrid FNT is used to identify the faces. To accelerate the convergence of the FNT and improve the quality of the solutions, the extended compact genetic programming (ECGP) and particle swarm optimization (PSO) are applied to optimize the FNT structure and parameters. The experimental results show that the proposed framework is efficient for face recognition.
{"title":"ICA Based on KPCA and Hybrid Flexible Neural Tree to Face Recognition","authors":"Jin Zhou, Yang Liu, Yuehui Chen","doi":"10.1109/CISIM.2007.37","DOIUrl":"https://doi.org/10.1109/CISIM.2007.37","url":null,"abstract":"In this paper, a new approach using independent component analysis (ica) and hybrid Flexible Neural Tree (FNT) is put forward for face recognition. To improve the quality of the face images, a series of image pre-processing techniques, which include histogram equalization, edge detection and geometrical transformation are used. The ICA based on Kernel principal component analysis (KPCA) and FastICA is employed to extract features, and the Hybrid FNT is used to identify the faces. To accelerate the convergence of the FNT and improve the quality of the solutions, the extended compact genetic programming (ECGP) and particle swarm optimization (PSO) are applied to optimize the FNT structure and parameters. The experimental results show that the proposed framework is efficient for face recognition.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses a general method of applying UBMSS (understanding based managing support systems) in data analysis. The method proposed is based on the analysis of economic data, especially data that is essential for a company's strategic decisions. The general method of applying UBMSS as sub-systems of a more general class of cognitive categorization systems is presented as a theoretical example of economic data analysis and interpretation.
{"title":"UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis","authors":"L. Ogiela","doi":"10.1109/CISIM.2007.69","DOIUrl":"https://doi.org/10.1109/CISIM.2007.69","url":null,"abstract":"This paper discusses a general method of applying UBMSS (understanding based managing support systems) in data analysis. The method proposed is based on the analysis of economic data, especially data that is essential for a company's strategic decisions. The general method of applying UBMSS as sub-systems of a more general class of cognitive categorization systems is presented as a theoretical example of economic data analysis and interpretation.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The human ear is a perfect source of data for passive person identification in many applications. In a growing need for security in various public places, ear biometrics seems to be a good solution, since ears are visible and their images can be easily taken, even without the examined person's knowledge. Then the robust feature extraction method can be applied to determine personality of individuals, for instance users of access control system or terrorists at the airports and stations. The growing interest in ear biometrics is best evidenced by the growth of publications over the last few years. More importantly research groups developed different approaches to a problem of feature selection and extraction for ear biometrics. In the article we overview the proposed algorithms of feature extraction from 2D and 3D ear images.
{"title":"Image Feature Extraction Methods for Ear Biometrics--A Survey","authors":"M. Choraś","doi":"10.1109/CISIM.2007.40","DOIUrl":"https://doi.org/10.1109/CISIM.2007.40","url":null,"abstract":"The human ear is a perfect source of data for passive person identification in many applications. In a growing need for security in various public places, ear biometrics seems to be a good solution, since ears are visible and their images can be easily taken, even without the examined person's knowledge. Then the robust feature extraction method can be applied to determine personality of individuals, for instance users of access control system or terrorists at the airports and stations. The growing interest in ear biometrics is best evidenced by the growth of publications over the last few years. More importantly research groups developed different approaches to a problem of feature selection and extraction for ear biometrics. In the article we overview the proposed algorithms of feature extraction from 2D and 3D ear images.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we introduce a new approach to semantic analysis of Web pages. To prove this approach we designed method for analysis and evaluation of Web pages. The method is built on a silent agreement between Web designers and users. The key aspects of this agreement are Web patterns which are used by Web designers in their Web page implementations. With our method we can find out whether the pattern is presented on the page with high level of relevance. Key feature of our method is independence on the page HTML code. In this lecture we explain essentials of our approach as well as key features of our method and context for proper usage. We present experiments which prove efficiency of the method and usefulness of the approach.
{"title":"GUI Patterns and Web Semantics","authors":"V. Snás̃el","doi":"10.1109/CISIM.2007.34","DOIUrl":"https://doi.org/10.1109/CISIM.2007.34","url":null,"abstract":"In this paper, we introduce a new approach to semantic analysis of Web pages. To prove this approach we designed method for analysis and evaluation of Web pages. The method is built on a silent agreement between Web designers and users. The key aspects of this agreement are Web patterns which are used by Web designers in their Web page implementations. With our method we can find out whether the pattern is presented on the page with high level of relevance. Key feature of our method is independence on the page HTML code. In this lecture we explain essentials of our approach as well as key features of our method and context for proper usage. We present experiments which prove efficiency of the method and usefulness of the approach.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117224908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a new optimization algorithm based on ant colony metaphor (ACO)and a new approach for the Multiple Knapsack Problem is presented. The MKP is the problem of assigning a subset of n items to m distinct knapsacks, such that the total profit sum of the selected items is maximized, without exceeding the capacity of each of the knapsacks. The problem has several difficulties in adaptation as well as the trail representation of the solutions of MKP or a dynamically changed heuristic function applied in this approach. Presented results show the power of the ACO approach for solving this type of subset problems.
{"title":"Ants and Multiple Knapsack Problem","authors":"U. Boryczka","doi":"10.1109/CISIM.2007.12","DOIUrl":"https://doi.org/10.1109/CISIM.2007.12","url":null,"abstract":"In this paper a new optimization algorithm based on ant colony metaphor (ACO)and a new approach for the Multiple Knapsack Problem is presented. The MKP is the problem of assigning a subset of n items to m distinct knapsacks, such that the total profit sum of the selected items is maximized, without exceeding the capacity of each of the knapsacks. The problem has several difficulties in adaptation as well as the trail representation of the solutions of MKP or a dynamically changed heuristic function applied in this approach. Presented results show the power of the ACO approach for solving this type of subset problems.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122154233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper deals with address generation for multiple run memory tests. It presents the algorithms for address sequences generation and proposes the new method for address sequences generation. The experimental results with the proposed address sequence are also shown.
{"title":"Address Sequences Generation for Multiple Run Memory Testing","authors":"S. Yarmolik, I. Mrozek, B. Sokol","doi":"10.1109/CISIM.2007.9","DOIUrl":"https://doi.org/10.1109/CISIM.2007.9","url":null,"abstract":"This paper deals with address generation for multiple run memory tests. It presents the algorithms for address sequences generation and proposes the new method for address sequences generation. The experimental results with the proposed address sequence are also shown.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114329406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increase of cars on the streets, more and more people in big cities, decide to move from one place to another by public transport, such as tram, metro or bus. Public transport users need detail informations about network connections. Therefore, some urban portals offer to use systems of optimization of public transport travel. However, finding one or several optimal routes, according to user preferences, is a difficult problem. This paper presents an original method for determining optimal paths in public transportation network. Author describes a network model with time- dependent and bi-modal links, defines the problem of finding optimal routes with users' preferences and proposes algorithm, which can be a solution of this problem.
{"title":"The Theoretical Framework of the Optimization of Public Transport Travel","authors":"J. Koszelew","doi":"10.1109/CISIM.2007.66","DOIUrl":"https://doi.org/10.1109/CISIM.2007.66","url":null,"abstract":"With the increase of cars on the streets, more and more people in big cities, decide to move from one place to another by public transport, such as tram, metro or bus. Public transport users need detail informations about network connections. Therefore, some urban portals offer to use systems of optimization of public transport travel. However, finding one or several optimal routes, according to user preferences, is a difficult problem. This paper presents an original method for determining optimal paths in public transportation network. Author describes a network model with time- dependent and bi-modal links, defines the problem of finding optimal routes with users' preferences and proposes algorithm, which can be a solution of this problem.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}