Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914174
Syifak Izhar Hisham, Liew Siau-Chuin, J. Zain, N. Johari, N. W. Arshad, Gran Badshah
Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS) is used widely at hospitals and clinical departments and it handles thousands of crucial electronic data in medical. We have introduced a fragile watermarking method using spiral manner numbering which showed a good numbering system and excellent embedding, but due to the technique, it only embedded in square shape. We enhanced the scheme to the Hilbert numbering scheme, which is more compatible with medical image modalities, which is not only specific to square shape of image but applicable to all kinds of image.
医学图像具有高度机密性,被用于保险索赔、管辖权证据和个人身份识别,被视为需要认证方法的关键数据之一。目前,医院信息系统(Hospital Information System, HIS)在医院和临床科室得到了广泛的应用,它处理着成千上万的医疗关键电子数据。本文介绍了一种采用螺旋方式编码的脆弱水印方法,该方法具有良好的编码系统和良好的嵌入性,但由于技术限制,只能嵌入方形。我们将该方案增强为Hilbert编号方案,该方案与医学图像模态更兼容,不仅针对方形图像,而且适用于各种图像。
{"title":"Authentication system for medical images using Hilbert numbering","authors":"Syifak Izhar Hisham, Liew Siau-Chuin, J. Zain, N. Johari, N. W. Arshad, Gran Badshah","doi":"10.1109/I4CT.2014.6914174","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914174","url":null,"abstract":"Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS) is used widely at hospitals and clinical departments and it handles thousands of crucial electronic data in medical. We have introduced a fragile watermarking method using spiral manner numbering which showed a good numbering system and excellent embedding, but due to the technique, it only embedded in square shape. We enhanced the scheme to the Hilbert numbering scheme, which is more compatible with medical image modalities, which is not only specific to square shape of image but applicable to all kinds of image.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914227
Khalid Edris, M. Fakhreldin, Jasni Mohamed Zain, T. Kadir, Khalid Adam
Reversible watermarking has drawn a lot of interest in recent years. To be reversible mean the original digital carrier can be completely restored. Sachnev et al proposed reversible watermarking algorithm by combining prediction technology, histogram shifting technology and sorting technology, which has good performance, however, their method is against the characteristics of the human visual system. In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method. The results indicate that the proposed scheme can embed data with less distortion.
{"title":"Reversible watermarking based on sorting prediction scheme","authors":"Khalid Edris, M. Fakhreldin, Jasni Mohamed Zain, T. Kadir, Khalid Adam","doi":"10.1109/I4CT.2014.6914227","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914227","url":null,"abstract":"Reversible watermarking has drawn a lot of interest in recent years. To be reversible mean the original digital carrier can be completely restored. Sachnev et al proposed reversible watermarking algorithm by combining prediction technology, histogram shifting technology and sorting technology, which has good performance, however, their method is against the characteristics of the human visual system. In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method. The results indicate that the proposed scheme can embed data with less distortion.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914170
M. A. Mohammed, Mohammed Morad Anad
The human resource has used the information technology long time ago because the companies are looking forward to hire the useful employees. Iraqi public and private organizations have problem to choose the right staff in the right position within the right time. The issues of choosing right person led to first administrative corruption, second waste the effort, third discarded the public money, fourth made the government less effective and fifth less efficiency government. Recently, Data warehouse is used to provide reports for public and private organizations' human resources. The reports and analysis that data warehouse provide can help the human resource personnel to select the right person in the right time for the suitable job. Ministry of Higher Education and Scientific Research (MOHESR) in Iraq can apply data warehouse to support its decision making. They can use it also to support human resource system in Iraq. This paper creates data warehouse architecture for human resource systems of public and private organizations which give authorized access for students' information of both public and private universities in Iraq. Moreover, the MOHESR can use this idea to increase its income by allowing the public and private organizations to find the proper staff through annual payment access.
{"title":"Data warehouse for human resource by Ministry of Higher Education and Scientific Research","authors":"M. A. Mohammed, Mohammed Morad Anad","doi":"10.1109/I4CT.2014.6914170","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914170","url":null,"abstract":"The human resource has used the information technology long time ago because the companies are looking forward to hire the useful employees. Iraqi public and private organizations have problem to choose the right staff in the right position within the right time. The issues of choosing right person led to first administrative corruption, second waste the effort, third discarded the public money, fourth made the government less effective and fifth less efficiency government. Recently, Data warehouse is used to provide reports for public and private organizations' human resources. The reports and analysis that data warehouse provide can help the human resource personnel to select the right person in the right time for the suitable job. Ministry of Higher Education and Scientific Research (MOHESR) in Iraq can apply data warehouse to support its decision making. They can use it also to support human resource system in Iraq. This paper creates data warehouse architecture for human resource systems of public and private organizations which give authorized access for students' information of both public and private universities in Iraq. Moreover, the MOHESR can use this idea to increase its income by allowing the public and private organizations to find the proper staff through annual payment access.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914223
Yen‐Hsien Lee, Shih-Tsung Liu, H. Lin, Wen-Jen Tseng
Long-term and continuous non-invasive driver's health monitoring has shown that it is the most important to measure driver's fatigue level and personal health status. Currently, there are many preferable methods, including ECG, EEG and EOG, to get the physiological parameters of driver. However, the size of the machine is large and the operation of monitors is difficult. The measurement procedure is limited by long-term, continuous measurement and also easy to cause discomfort. To improve these issues, the noncontact and non-pressurized measuring method will become an important innovation improvement. This paper presents a driver's health management system using noncontact physical sensor technology. The system contains three portions: (a) nanosecond pulse near-field sensing (NPNS) radar system, (b) physiological signal processing, and (c) controller area network (CAN) system. The experimental results show that the NPNS radar sensor can be applied to detect driver's health status and combined with car system for driving safety and health management.
{"title":"Driver's health management system using nanosecond pulse near-field sensing technology","authors":"Yen‐Hsien Lee, Shih-Tsung Liu, H. Lin, Wen-Jen Tseng","doi":"10.1109/I4CT.2014.6914223","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914223","url":null,"abstract":"Long-term and continuous non-invasive driver's health monitoring has shown that it is the most important to measure driver's fatigue level and personal health status. Currently, there are many preferable methods, including ECG, EEG and EOG, to get the physiological parameters of driver. However, the size of the machine is large and the operation of monitors is difficult. The measurement procedure is limited by long-term, continuous measurement and also easy to cause discomfort. To improve these issues, the noncontact and non-pressurized measuring method will become an important innovation improvement. This paper presents a driver's health management system using noncontact physical sensor technology. The system contains three portions: (a) nanosecond pulse near-field sensing (NPNS) radar system, (b) physiological signal processing, and (c) controller area network (CAN) system. The experimental results show that the NPNS radar sensor can be applied to detect driver's health status and combined with car system for driving safety and health management.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914160
Mohd Hairi Mohd Zaman, M. Mustafa, A. Hussain
Speech intelligibility verification through a listening test session by human raters was conducted to assess the intelligibility of band-limited speech. The band-limited speech was generated using nonlinear frequency compression via spectral envelope transformation to assist individuals with high-frequency hearing loss. However, addressing the issue on the reliability of the assessment method is important because of the human factors that cause variability in the intelligibility test results. This study investigated the use of Cohen's Kappa coefficient to measure the inter-rater reliability in the intelligibility test. The inter-rater reliability was found to be high when Cohen's Kappa coefficient was over 0.6. The result indicates that the human raters showed a high level of agreement in assessing the intelligibility of the band-limited speech.
{"title":"Inter-rater reliability of accessing the intelligibility of band-limited transformed speech using nonlinear frequency compression","authors":"Mohd Hairi Mohd Zaman, M. Mustafa, A. Hussain","doi":"10.1109/I4CT.2014.6914160","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914160","url":null,"abstract":"Speech intelligibility verification through a listening test session by human raters was conducted to assess the intelligibility of band-limited speech. The band-limited speech was generated using nonlinear frequency compression via spectral envelope transformation to assist individuals with high-frequency hearing loss. However, addressing the issue on the reliability of the assessment method is important because of the human factors that cause variability in the intelligibility test results. This study investigated the use of Cohen's Kappa coefficient to measure the inter-rater reliability in the intelligibility test. The inter-rater reliability was found to be high when Cohen's Kappa coefficient was over 0.6. The result indicates that the human raters showed a high level of agreement in assessing the intelligibility of the band-limited speech.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914166
N. Sahar, M. Islam, N. Misran
An U-shaped patches loaded with dipole antenna designed for multiband antenna is proposed. The antenna can be reconfigured as single band at 3.5 GHz and dual-band frequencies at 2.4 GHz and 5.2 as required in WiMAX and WLAN applications. The length slot and length of U-shaped patch can be varied to adjust the desired upper frequency as well as the bandwidth. Moreover, the lower frequency also can be tuned by varying the dipole arms for both elements. The gains are performed 2.1 dB, 2 dB and 5.54 dB for single and dual band respectively with total efficiency is greater than 90%. The design methodology and antenna measurement results are both presented and discussed in this letter.
{"title":"A reconfigurable multiband antenna for WLAN and WiMAX applications","authors":"N. Sahar, M. Islam, N. Misran","doi":"10.1109/I4CT.2014.6914166","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914166","url":null,"abstract":"An U-shaped patches loaded with dipole antenna designed for multiband antenna is proposed. The antenna can be reconfigured as single band at 3.5 GHz and dual-band frequencies at 2.4 GHz and 5.2 as required in WiMAX and WLAN applications. The length slot and length of U-shaped patch can be varied to adjust the desired upper frequency as well as the bandwidth. Moreover, the lower frequency also can be tuned by varying the dipole arms for both elements. The gains are performed 2.1 dB, 2 dB and 5.54 dB for single and dual band respectively with total efficiency is greater than 90%. The design methodology and antenna measurement results are both presented and discussed in this letter.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914228
N. A. Hamid, A. M. Darsono, N. A. Manap, R. A. Manap, H. Sulaiman
Many fast Block Matching Algorithm or BMA have been proposed and developed in recent years in order to reduce the computational cost while maintaining the quality of the video signal. In this paper, a new Orthogonal-Diamond Search (ODS) is proposed which employs an orthogonal-shaped search pattern in the first step and then is switched into small diamond-shaped search pattern for the next step. The proposed algorithm and several established algorithms, namely Full Search (FS), Three-Step Search (TSS) and Diamond Search (DS) are implemented using MATLAB and their performance are being compared and analyzed in terms of computational complexity, peak signal-to-noise ratio (PSNR), and number of search points. Simulation result shows that the proposed algorithm can find motion vector with fewer number of search points while maintains close performance of video quality with other selected algorithms.
{"title":"A new Orthogonal - Diamond Search algorithm for Motion Estimation","authors":"N. A. Hamid, A. M. Darsono, N. A. Manap, R. A. Manap, H. Sulaiman","doi":"10.1109/I4CT.2014.6914228","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914228","url":null,"abstract":"Many fast Block Matching Algorithm or BMA have been proposed and developed in recent years in order to reduce the computational cost while maintaining the quality of the video signal. In this paper, a new Orthogonal-Diamond Search (ODS) is proposed which employs an orthogonal-shaped search pattern in the first step and then is switched into small diamond-shaped search pattern for the next step. The proposed algorithm and several established algorithms, namely Full Search (FS), Three-Step Search (TSS) and Diamond Search (DS) are implemented using MATLAB and their performance are being compared and analyzed in terms of computational complexity, peak signal-to-noise ratio (PSNR), and number of search points. Simulation result shows that the proposed algorithm can find motion vector with fewer number of search points while maintains close performance of video quality with other selected algorithms.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914209
T. Zaid, S. Saat, Y. Yusop, N. Jamal
A coupled of ultrasonic transducer can act as a power transmission device by means of Acoustic Energy Transfer (AET). This method is relatively new method of contactless energy transfer and could be an alternative to the currently established technologies for the contactless transmission of power, such as inductive power transfer (IPT) and capacitive coupled power transfer (CPT). This paper presents a review on energy transmission through ultrasonic transducers as a source of power that has been applied by various researchers. Through this review, we hope that a better understanding of AET concept can be established and therefore can have a bright future.
{"title":"Contactless energy transfer using acoustic approach - A review","authors":"T. Zaid, S. Saat, Y. Yusop, N. Jamal","doi":"10.1109/I4CT.2014.6914209","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914209","url":null,"abstract":"A coupled of ultrasonic transducer can act as a power transmission device by means of Acoustic Energy Transfer (AET). This method is relatively new method of contactless energy transfer and could be an alternative to the currently established technologies for the contactless transmission of power, such as inductive power transfer (IPT) and capacitive coupled power transfer (CPT). This paper presents a review on energy transmission through ultrasonic transducers as a source of power that has been applied by various researchers. Through this review, we hope that a better understanding of AET concept can be established and therefore can have a bright future.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914146
Sasan Karamizadeh, Shahidan M. Abdullah, M. Halimi, J. Shayan, Mohammad Javad Rajabi
Support Vector Machine(SVM)is one of the most efficient machine learning algorithms, which is mostly used for pattern recognition since its introduction in 1990s. SVMs vast variety of usage, such as face and speech recognition, face detection and image recognition has turned it into a very useful algorithm. This has also been applied to many pattern classification problems such as image recognition, speech recognition, text categorization, face detection, and faulty card detection.Statistics was collected from journals and electronic sources published in the period of 2000 to 2013. Pattern recognition aims to classify data based on either a priori knowledge or statistical information extracted from raw data, which is a powerful tool in data separation in many disciplines. The Support Vector Machine (SVM) is a kind of algorithms in biometrics. It is a statistics technical and used orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables.
{"title":"Advantage and drawback of support vector machine functionality","authors":"Sasan Karamizadeh, Shahidan M. Abdullah, M. Halimi, J. Shayan, Mohammad Javad Rajabi","doi":"10.1109/I4CT.2014.6914146","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914146","url":null,"abstract":"Support Vector Machine(SVM)is one of the most efficient machine learning algorithms, which is mostly used for pattern recognition since its introduction in 1990s. SVMs vast variety of usage, such as face and speech recognition, face detection and image recognition has turned it into a very useful algorithm. This has also been applied to many pattern classification problems such as image recognition, speech recognition, text categorization, face detection, and faulty card detection.Statistics was collected from journals and electronic sources published in the period of 2000 to 2013. Pattern recognition aims to classify data based on either a priori knowledge or statistical information extracted from raw data, which is a powerful tool in data separation in many disciplines. The Support Vector Machine (SVM) is a kind of algorithms in biometrics. It is a statistics technical and used orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914185
A. Waqas, Zulkefli Muhammed Yusof, Asadullah Shah, Nadeem Mahmood
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources and business transactions. Most of the proposed architectures for cloud computing implementations are for individual clouds which do not allow the sharing of attack information with other clouds and hence the other clouds are not able to safe themselves from the same attack. The aim of this research is to propose a conceptual framework for connected or federated clouds that can share information regarding attacks and attackers for securing themselves.
{"title":"Sharing of attacks information across clouds for improving security: A conceptual framework","authors":"A. Waqas, Zulkefli Muhammed Yusof, Asadullah Shah, Nadeem Mahmood","doi":"10.1109/I4CT.2014.6914185","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914185","url":null,"abstract":"Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources and business transactions. Most of the proposed architectures for cloud computing implementations are for individual clouds which do not allow the sharing of attack information with other clouds and hence the other clouds are not able to safe themselves from the same attack. The aim of this research is to propose a conceptual framework for connected or federated clouds that can share information regarding attacks and attackers for securing themselves.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}