首页 > 最新文献

International Journal of Enterprise Network Management最新文献

英文 中文
SaaS multitenant performance testing over social networks 社交网络上的SaaS多租户性能测试
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015775
M. Sumalatha, M. Parthiban
Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a genetic algorithm and a symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on open stack cloud computing environment over social networks.
近年来,云计算被描述为方便合适的按需网络访问。在云计算中,计算多租户在软件即服务(SaaS)中扮演着重要的角色。SaaS多租户云感知应用程序的结构引发了几个新的挑战,中心挑战是租户。在云测试中,除了要使用的性能测试外,还需要测试租户应用程序。与此同时,存在许多性能测试技术;它们中的大多数只产生测试配置的固定进度。本文重点讨论了SaaS中多租户测试面临的挑战,并动态分析了SaaS测试与传统应用程序测试的不同之处。提出了各租户的性能测试和最适函数。适应度函数采用遗传算法和符号执行相结合的GASE算法。该算法使用上述性能测试值,以适应度代的形式获得每个租户的最佳值。提出了在社交网络上使用开放堆栈云计算环境中的多租户的实际实验。
{"title":"SaaS multitenant performance testing over social networks","authors":"M. Sumalatha, M. Parthiban","doi":"10.1504/IJENM.2018.10015775","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015775","url":null,"abstract":"Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a genetic algorithm and a symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on open stack cloud computing environment over social networks.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"234-250"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47944197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication as a service in cloud from a fuzzy perspective 从模糊的角度看云中的身份验证服务
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015850
S. Vijayalakshmi, G. R Karpagam
In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.
在基于云的在线投票系统中,生命周期从选民登记、身份验证、投票和计票开始。选举过程是一个秘密的过程,整个民主管理集中在投票上。身份验证、机密性、完整性、可扩展性、速度和准确性这些都是在线投票系统需要满足的几个重要标准。身份验证可以被认为是上述所有问题中最关键的问题。因此,应该把选民放在首位,使投票过程公平有效。通过对一些研究认证机制问题的文献分析,提出的方法隐藏了原始的生物特征模板,即使系统中存储的数据向攻击者开放,也无法恢复生物特征模板。我们用安全需求、问题、技术和机制之间的相关性矩阵对系统进行评估。
{"title":"Authentication as a service in cloud from a fuzzy perspective","authors":"S. Vijayalakshmi, G. R Karpagam","doi":"10.1504/IJENM.2018.10015850","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015850","url":null,"abstract":"In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"352"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48150254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless system for flight safety industry 飞行安全行业无线系统
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015773
V. Kavitha, A. S. Lakshmi
Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.
许多参数可以测量并存储在黑盒中。存储在黑盒中的详细信息对于分析事故原因至关重要。在正式的黑匣子中,数据被存储,只有在崩溃后识别出黑匣子后才能检索到。因此,很难确定碰撞后黑匣子的确切位置。许多主要官员和知名人士死于空难,确定坠机地点需要大量时间。这会浪费金钱和时间。拯救人类生命是人类的基本本性。在本文中,黑盒数据被传输到地球站。通过无线介质将细节更新到基站。通过使用自组织算法计算基站之间的最短路径,将其发送到选定的基站。Ad hoc算法是一种多跳网络算法,通过计算其距离来切换到不同的站点。因此,使用ad hoc算法将黑盒数据无线地更新到基站。
{"title":"Wireless system for flight safety industry","authors":"V. Kavitha, A. S. Lakshmi","doi":"10.1504/IJENM.2018.10015773","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015773","url":null,"abstract":"Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"227"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43988018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multisite aggregate production and distribution planning: a review 多站点聚合生产和分配计划:综述
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015859
S. Prakash, G. Soni, V. Jain, G. K. Badhotiya, M. L. Mittal
Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analysing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.
产品需求的增加导致公司将其制造系统从单工厂改为多工厂(或多站点),目的是在全球制造场景中获得竞争优势。在过去的二十年里,研究者和实践者对多站点生产和分配(P-D)计划进行了研究和实践。大量的文献已经出版,而且这种趋势还在继续。鉴于多地点制造在全球竞争中对获得商业优势的影响,本文对多地点综合生产计划(MSAPP)和多地点综合P-D计划(MSAPDP)进行了综述。本文着重分析了MSAPP/MSAPDP的主要研究空白和未解决的领域。人们认为,从离散到连续,从纯数学到模拟和基于智能体的模型的转换,以及考虑经济和环境方面,对于有效处理现实世界的MSAPP/MSAPDP问题已经变得非常重要。
{"title":"Multisite aggregate production and distribution planning: a review","authors":"S. Prakash, G. Soni, V. Jain, G. K. Badhotiya, M. L. Mittal","doi":"10.1504/IJENM.2018.10015859","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015859","url":null,"abstract":"Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analysing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"407"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45123736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An automatic construction of domain ontology to analyse competence prerequisites of jobs 自动构建领域本体分析工作能力前提
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015848
N. Kumaresh, J. A. Samath, M. Iqbal
In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyse their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organisations. In the proposed work, this issue is rectified through domain ontology construction framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity-based clustering method. From those clustered documents job-know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate.
在许多行业,招聘过程是一项关键任务,许多申请人将申请单一职位,因此需要分析他们的资格,以符合要求。确定具有所需知识和技能的可行候选人是组织面临的艰巨任务。在所提出的工作中,通过领域本体构建框架(DOCF)从在线获得的工作知识论文和工作需求细节中纠正了这一问题。基于内容和概念相似性的聚类方法对获得的文档进行聚类。从这些聚集的文档中,将构建作业认知本体。因此,很容易由求职者和行业的人力资源(HR)创建有关求职阶段的信息需求。结果表明,与现有的研究方法相比,该研究方法在提高准确率方面取得了更好的结果。
{"title":"An automatic construction of domain ontology to analyse competence prerequisites of jobs","authors":"N. Kumaresh, J. A. Samath, M. Iqbal","doi":"10.1504/IJENM.2018.10015848","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015848","url":null,"abstract":"In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyse their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organisations. In the proposed work, this issue is rectified through domain ontology construction framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity-based clustering method. From those clustered documents job-know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"441-454"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44278241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise IT专业人士采用智能手表的决定因素——智能手表企业的扩展UTAUT2模型
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015843
A. Kranthi, K. Ahmed
Smartwatches these days have gained popularity under wearable device category. Consumers of smartwatches consider several factors while choosing smartwatches. On this premise, the current research is undertaken to identify the determinants of the smartwatch adoption. In order to arrive at this objective, the study has employed unified theory of acceptance and use of technology 2 (UTAUT2) model as a means and underpinning framework. To suit context, the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). To validate and check the explanatory power of the extended UTAUT2 model the study has considered Structural equation modelling using Smart PLS 2.0.The results arrived in this study has concluded that the extended UTAUT2 model has a better explanatory power on behavioural intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are also discussed.
智能手表最近在可穿戴设备类别中受到欢迎。智能手表的消费者在选择智能手表时会考虑几个因素。在这个前提下,目前的研究是为了确定智能手表采用的决定因素。为了达到这一目标,本研究采用了技术接受和使用统一理论2 (UTAUT2)模型作为手段和基础框架。本研究将自我效能感(SEF)、个人创新能力(PINNO)、社交媒体影响力(SMI)、社会形象(SIMG)、审美(AES)和外部社会影响(ESI)纳入UTAUT2模型,进一步扩展了UTAUT2模型。为了验证和检查扩展UTAUT2模型的解释力,本研究考虑了使用Smart PLS 2.0的结构方程建模。本研究的结果得出结论,扩展的UTAUT2模型对智能手表采用的行为意图具有更好的解释力。还讨论了扩展UTAUT2模型的效应大小(f2)和预测相关性(Q2)。
{"title":"Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise","authors":"A. Kranthi, K. Ahmed","doi":"10.1504/IJENM.2018.10015843","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015843","url":null,"abstract":"Smartwatches these days have gained popularity under wearable device category. Consumers of smartwatches consider several factors while choosing smartwatches. On this premise, the current research is undertaken to identify the determinants of the smartwatch adoption. In order to arrive at this objective, the study has employed unified theory of acceptance and use of technology 2 (UTAUT2) model as a means and underpinning framework. To suit context, the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). To validate and check the explanatory power of the extended UTAUT2 model the study has considered Structural equation modelling using Smart PLS 2.0.The results arrived in this study has concluded that the extended UTAUT2 model has a better explanatory power on behavioural intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are also discussed.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"294"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46675165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework 一种基于Triso框架的无线企业自组织虚拟社区网络功耗高效协议
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015836
R. Manivannan, M. Chinnadurai
Today's global technology has various security treats which made the identity protection essential among user's for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.
当今的全球技术有各种各样的安全措施,这使得用户之间的身份保护对于在互联网上建立通信至关重要。通常,这些身份保护网络被称为匿名通信网络。混合网络是一种多级系统,它为互联网上的匿名通信提供了有效的机制。根据这些网络具有各种流量分析攻击,这些攻击需要危害用户的身份。本文的主要目的是提出一种针对流量分析攻击、泄露攻击和垃圾邮件攻击的多样性混合技术。在这项工作中,我们提出了流量重新分配,包括改变网络中消息的大小和数量。通过在网络节点之间实现这种消息的爆发和混合,攻击者会对不同的消息计数和大小感到困惑。针对这三种攻击对我们提出的工作的性能进行了检查,以检查其安全性和匿名性。所获得的结果证明了我们提出的技术的有效性。
{"title":"An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework","authors":"R. Manivannan, M. Chinnadurai","doi":"10.1504/IJENM.2018.10015836","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015836","url":null,"abstract":"Today's global technology has various security treats which made the identity protection essential among user's for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"317"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44962376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An anomaly-based network intrusion detection system using ensemble clustering 一种基于异常的集成聚类网络入侵检测系统
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015839
V. Jackins, D. Punithavathani
The numbers of hacking and intrusion incidents are high due to the increasing use of internet services and computer application. Therefore, intrusion detection systems (IDS) are inevitable in today's scenario (Koruba et al., 2017). In this paper, an unsupervised technique based on hybrid clustering algorithms is used for Anomaly detection. Incremental support vector machine (ISVM) and C means (FCM) algorithms are applied to preprocess the data set and detect the anomalies respectively. Further, the processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the intrusion prevention system (IPS). The proposed hybrid algorithm is applied for KDD Cup 1999 dataset and Gure Kdd Cup data base (2008) and the results show high detection rates and low false positive alarms. Further, the proposed technique performs well with a real time data in detecting anomalies with enhanced true positive rate.
由于越来越多地使用互联网服务和计算机应用程序,黑客和入侵事件的数量很高。因此,入侵检测系统(IDS)在今天的场景中是不可避免的(Koruba等人,2017)。本文将一种基于混合聚类算法的无监督技术用于异常检测。分别采用增量支持向量机(ISVM)和C均值(FCM)算法对数据集进行预处理和异常检测。此外,处理后的数据被馈送到DBSCAN算法,用于进一步检测异常。检测系统的结果被传送到入侵防御系统(IPS)。将所提出的混合算法应用于KDD Cup 1999数据集和Gure KDD Cup数据库(2008),结果表明检测率高,误报率低。此外,所提出的技术在检测具有增强的真阳性率的异常方面与实时数据表现良好。
{"title":"An anomaly-based network intrusion detection system using ensemble clustering","authors":"V. Jackins, D. Punithavathani","doi":"10.1504/IJENM.2018.10015839","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015839","url":null,"abstract":"The numbers of hacking and intrusion incidents are high due to the increasing use of internet services and computer application. Therefore, intrusion detection systems (IDS) are inevitable in today's scenario (Koruba et al., 2017). In this paper, an unsupervised technique based on hybrid clustering algorithms is used for Anomaly detection. Incremental support vector machine (ISVM) and C means (FCM) algorithms are applied to preprocess the data set and detect the anomalies respectively. Further, the processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the intrusion prevention system (IPS). The proposed hybrid algorithm is applied for KDD Cup 1999 dataset and Gure Kdd Cup data base (2008) and the results show high detection rates and low false positive alarms. Further, the proposed technique performs well with a real time data in detecting anomalies with enhanced true positive rate.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"251"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46291210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Power efficient digital circuits for ECG front end data acquisition mobile system 用于心电前端数据采集移动系统的节能数字电路
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015840
D. Sasikala, S. Muthukumar, R. Sivaranjani
The electrical motion of the heart is characterised by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption. In the proposed work, analogue block is not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture, analogue blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130 nm and 65 nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130 nm consumes 18.9 pW and 65 nm consumes 109 pW of power.
心脏的电运动以ECG信号为特征。心电图阐明可用于检测心脏综合征。该技术是一种高效的诊断工具,由于人们对便携式电子产品的高度重视,低功耗系统近年来受到了越来越多的关注。本文介绍了一种降低功耗的数字心电数据采集系统。在拟议的工作中,没有使用模拟块,他们通过延迟线将输入电压转换为数字代码。该数字架构能够在诸如0.3V和0.1V的低电源电压下操作。在该架构中,不使用诸如低噪声放大器(LNA)和滤波器的模拟块。采用数字反馈回路来消除直流偏移对电路的影响,从而消除了对耦合电容器的要求。该电路采用130nm和65nm CMOS工艺实现。仿真结果表明,130nm数字结构的前端电路功耗为18.9pW,65nm功耗为109pW。
{"title":"Power efficient digital circuits for ECG front end data acquisition mobile system","authors":"D. Sasikala, S. Muthukumar, R. Sivaranjani","doi":"10.1504/IJENM.2018.10015840","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015840","url":null,"abstract":"The electrical motion of the heart is characterised by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption. In the proposed work, analogue block is not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture, analogue blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130 nm and 65 nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130 nm consumes 18.9 pW and 65 nm consumes 109 pW of power.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"261"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42542115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical study on customer adoption of mobile payment application in India 印度客户采用移动支付应用的实证研究
Q3 Business, Management and Accounting Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.094675
J. Joseph, K. Sriram, L. L. Rodrigues, A. O. Mathew, K. Gana
Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest options for making payments and is predicted to have a very large potential in the days to come. This study focuses on the customer adoption of mobile payment application. The study reveals that the factors like usefulness, pervasiveness, ease of use, offers and cash back and service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups. Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.
数字经济正在成为现实。世界各地的企业都在向数字平台发展,支付方式也是如此。移动应用程序正在成为最简单、最快的支付方式之一,预计在未来几天将具有巨大的潜力。本研究的重点是客户对移动支付应用程序的采用情况。研究表明,有用性、普及性、易用性、优惠、现金返还和服务等因素在鼓励采用移动支付应用程序方面发挥着至关重要的作用。结果显示,与移动网络浏览器相比,客户更喜欢移动支付应用程序,这是客户意识到的一个明显迹象。研究还表明,青少年在接受移动支付应用程序方面比老年人更积极。与其他支付模式相比,客户对移动支付的偏好为14.5%,这一比例较低,需要积极的促销和营销活动。这项研究揭示了客户采用因素,这些因素可以作为提高客户对移动支付应用程序的采用和认识的指导方针。
{"title":"An empirical study on customer adoption of mobile payment application in India","authors":"J. Joseph, K. Sriram, L. L. Rodrigues, A. O. Mathew, K. Gana","doi":"10.1504/IJENM.2018.094675","DOIUrl":"https://doi.org/10.1504/IJENM.2018.094675","url":null,"abstract":"Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest options for making payments and is predicted to have a very large potential in the days to come. This study focuses on the customer adoption of mobile payment application. The study reveals that the factors like usefulness, pervasiveness, ease of use, offers and cash back and service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups. Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"363-375"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJENM.2018.094675","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46804860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
International Journal of Enterprise Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1