首页 > 最新文献

International Journal of Computer Science and Applications最新文献

英文 中文
Thematic and Self-Learning Method for Persian, English and Penglish Spams Identification 波斯语、英语和英语垃圾邮件识别的主题和自学方法
Q4 Computer Science Pub Date : 2014-08-31 DOI: 10.5121/IJCSA.2014.4401
S. Hashemi, K. Monfaredi
{"title":"Thematic and Self-Learning Method for Persian, English and Penglish Spams Identification","authors":"S. Hashemi, K. Monfaredi","doi":"10.5121/IJCSA.2014.4401","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4401","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83544669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher RC4对称流密码的现实密码方法研究现状
Q4 Computer Science Pub Date : 2014-08-31 DOI: 10.5121/IJCSA.2014.4403
Disha Handa, B. Kapoor
In this paper we present low -cost, concurrent checking methods for multiple error detection in S -boxes of symmetric block ciphers. These are redundancy-based fault detection schemes. We describe some studies of parity based concurrent error detection in S -boxes. Probability of multiple error detection is analyzed for random data. In this work 48-input, 32-output substitution blocks are taken into consideration.
本文提出了一种低成本的并行校验方法,用于对称分组密码S -盒中的多重错误检测。这些都是基于冗余的故障检测方案。我们描述了基于奇偶校验的S -box并发错误检测的一些研究。分析了随机数据多重错误检测的概率。在这项工作中,考虑了48个输入,32个输出的替换块。
{"title":"State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher","authors":"Disha Handa, B. Kapoor","doi":"10.5121/IJCSA.2014.4403","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4403","url":null,"abstract":"In this paper we present low -cost, concurrent checking methods for multiple error detection in S -boxes of symmetric block ciphers. These are redundancy-based fault detection schemes. We describe some studies of parity based concurrent error detection in S -boxes. Probability of multiple error detection is analyzed for random data. In this work 48-input, 32-output substitution blocks are taken into consideration.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"10 1","pages":"27-32"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87292164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Scene Classification Using Pyramid Histogram of Multi-Scale Block Local Binary Pattern 基于多尺度块局部二值模式的金字塔直方图场景分类
Q4 Computer Science Pub Date : 2014-08-31 DOI: 10.5121/IJCSA.2014.4402
Dipankar Das
Pyramid Histogram of Multi-scale Block Local Binary Pattern (PH-MBLBP) descriptor for recognizing scene categories, is presented in this paper. We show that scene categorization, especially for indoor and outdoor environments, requires its visual descriptor to process properties that are different from other vision domains (e.g., SIFT descriptor used for object categorization). Our proposed PH-MBLBP satisfies these properties and suits the scene categorization task. Since the proposed PH-MBLBP mainly encodes micro- and macro-structures of image patterns, thus, it provides relatively more complete image descriptor than the basic LBP operator. Moreover, our PH-MBLBP descriptor is more powerful texture descriptor than the conventional operator and it can also be calculated extremely fast. Our experiments demonstrate that PH-MBLBP outperforms the other descriptor such as SIFT.
提出了一种用于场景分类识别的多尺度块局部二值模式(PH-MBLBP)描述符金字塔直方图。我们表明,场景分类,特别是室内和室外环境,需要其视觉描述符来处理与其他视觉域不同的属性(例如,用于对象分类的SIFT描述符)。我们提出的PH-MBLBP满足这些特性,适合场景分类任务。由于所提出的PH-MBLBP主要对图像模式的微观和宏观结构进行编码,因此,它比基本LBP算子提供了相对更完整的图像描述符。此外,我们的PH-MBLBP描述符是比传统算子更强大的纹理描述符,它的计算速度也非常快。我们的实验表明,PH-MBLBP优于其他描述符,如SIFT。
{"title":"Scene Classification Using Pyramid Histogram of Multi-Scale Block Local Binary Pattern","authors":"Dipankar Das","doi":"10.5121/IJCSA.2014.4402","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4402","url":null,"abstract":"Pyramid Histogram of Multi-scale Block Local Binary Pattern (PH-MBLBP) descriptor for recognizing scene categories, is presented in this paper. We show that scene categorization, especially for indoor and outdoor environments, requires its visual descriptor to process properties that are different from other vision domains (e.g., SIFT descriptor used for object categorization). Our proposed PH-MBLBP satisfies these properties and suits the scene categorization task. Since the proposed PH-MBLBP mainly encodes micro- and macro-structures of image patterns, thus, it provides relatively more complete image descriptor than the basic LBP operator. Moreover, our PH-MBLBP descriptor is more powerful texture descriptor than the conventional operator and it can also be calculated extremely fast. Our experiments demonstrate that PH-MBLBP outperforms the other descriptor such as SIFT.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"41 1","pages":"15-25"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89504152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PERFORMANCE ANALYSIS OF LOGIC COVERAGE CRITERIA USING MUMCUT AND MINIMAL MUMCUT 使用mumcut和最小化mumcut对逻辑覆盖标准进行性能分析
Q4 Computer Science Pub Date : 2014-08-31 DOI: 10.5121/IJCSA.2014.4404
Usha Badhera, A. Maheshwari
Logic coverage criteria are central aspect of programs and specifications in the testing of software. A Boolean expression with n variables in expression 2 n distinct test cases is required for exhaustive testing .This is expensive even when n is modestly large. The possible solution is to select a small subset of all possible test cases which can effectively detect most of the common faults. Test case prioritization is one of the key techniques for making testing cost effective. In present study performance index of test suite is calculated for two Boolean specification testing techniques MUMCUT and Minimal-MUMCUT. Performance index helps to measure the efficiency and determine when testing can be stopped in case of limited resources. This paper evaluates the testability of generated single faults according to the number of test cases used to detect them. Test cases are generated from logic expressions in irredundant normal form (IDNF) derived from specifications or source code. The efficiency of prioritization techniques has been validated by an empirical study done on bench mark expressions using Performance Index (PI) metric.
逻辑覆盖标准是软件测试中程序和规范的核心方面。在表达式2n个不同的测试用例中需要一个有n个变量的布尔表达式来进行穷举测试,即使n相当大,这也是很昂贵的。可能的解决方案是选择所有可能的测试用例的一个小子集,它可以有效地检测大多数常见故障。测试用例优先级是使测试成本有效的关键技术之一。本文对两种布尔规格测试技术MUMCUT和Minimal-MUMCUT进行了测试套件性能指标的计算。性能指标有助于衡量效率,并确定在资源有限的情况下何时可以停止测试。本文根据用于检测单个故障的测试用例的数量来评估生成的单个故障的可测试性。测试用例是从源自规范或源代码的非冗余范式(IDNF)的逻辑表达式中生成的。通过对使用性能指数(PI)度量的基准表达式进行的实证研究,验证了优先级技术的效率。
{"title":"PERFORMANCE ANALYSIS OF LOGIC COVERAGE CRITERIA USING MUMCUT AND MINIMAL MUMCUT","authors":"Usha Badhera, A. Maheshwari","doi":"10.5121/IJCSA.2014.4404","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4404","url":null,"abstract":"Logic coverage criteria are central aspect of programs and specifications in the testing of software. A Boolean expression with n variables in expression 2 n distinct test cases is required for exhaustive testing .This is expensive even when n is modestly large. The possible solution is to select a small subset of all possible test cases which can effectively detect most of the common faults. Test case prioritization is one of the key techniques for making testing cost effective. In present study performance index of test suite is calculated for two Boolean specification testing techniques MUMCUT and Minimal-MUMCUT. Performance index helps to measure the efficiency and determine when testing can be stopped in case of limited resources. This paper evaluates the testability of generated single faults according to the number of test cases used to detect them. Test cases are generated from logic expressions in irredundant normal form (IDNF) derived from specifications or source code. The efficiency of prioritization techniques has been validated by an empirical study done on bench mark expressions using Performance Index (PI) metric.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"41 1","pages":"39-48"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90345599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Sequential Patterns for interval based events by applying multiple constraints 通过应用多个约束挖掘基于间隔的事件的顺序模式
Q4 Computer Science Pub Date : 2014-08-31 DOI: 10.5121/IJCSA.2014.4406
Kalaivany M, U. V.
Sequential pattern mining finds the frequent subsequences or patterns from the given sequences. TPrefixSpan algorithm finds the relevant frequent patterns from the given sequential patterns formed using interval based events. In our proposed work, we add multiple constraints like item, length and aggregate to the interval based TPrefixSpan algorithm. By adding these constraints the efficiency and effectiveness of the algorithm improves. The proposed constraint based algorithm CTPrefixSpan has been applied to synthetic medical dataset. The algorithm can be applied for stock market analysis, DNA sequences analysis etc.
序列模式挖掘从给定序列中查找频繁子序列或模式。TPrefixSpan算法从使用基于间隔的事件形成的给定序列模式中找到相关的频繁模式。在我们提出的工作中,我们在基于区间的TPrefixSpan算法中添加了多个约束,如条目、长度和聚合。通过加入这些约束,提高了算法的效率和有效性。提出的基于约束的CTPrefixSpan算法已应用于合成医学数据集。该算法可用于股票市场分析、DNA序列分析等。
{"title":"Mining Sequential Patterns for interval based events by applying multiple constraints","authors":"Kalaivany M, U. V.","doi":"10.5121/IJCSA.2014.4406","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4406","url":null,"abstract":"Sequential pattern mining finds the frequent subsequences or patterns from the given sequences. TPrefixSpan algorithm finds the relevant frequent patterns from the given sequential patterns formed using interval based events. In our proposed work, we add multiple constraints like item, length and aggregate to the interval based TPrefixSpan algorithm. By adding these constraints the efficiency and effectiveness of the algorithm improves. The proposed constraint based algorithm CTPrefixSpan has been applied to synthetic medical dataset. The algorithm can be applied for stock market analysis, DNA sequences analysis etc.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"22 1","pages":"59-66"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85370070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Single_Node Risk Spread in Supply Chain Complex Network Based on Fixed Risk Values 基于固定风险值的供应链复杂网络单节点风险扩散研究
Q4 Computer Science Pub Date : 2014-08-01 DOI: 10.14355/ijcsa.2014.0303.03
Y. Chiew, Yachao Shi
Complex networks cannot only describe the complicated, asynchronous system, but also can be used to model and analyze network topological properties. Sophisticated methods for network construction and analysis exist in other fields. But until recently, researchers have few focused on the risk spread of a supply chain network. In this paper, a supply chain risk network based on single_node risk spread is modeled and the static network statistics are analyzed, including degree distribution, risk distribution, average path length and clustering coefficient. The simulation results indicate that supply chain complex network is a small-world network with short average path length and high degree of clustering, and its degree distribution and risk distribution follow a double power law. In addition, the average risk tends to decrease with the total number of risk node increase in supply chain risk spread network.
复杂网络不仅可以描述复杂的、异步的系统,而且可以用来对网络拓扑特性进行建模和分析。在其他领域也存在复杂的网络构建和分析方法。但直到最近,研究人员还很少关注供应链网络的风险扩散。本文建立了基于单节点风险扩散的供应链风险网络模型,并对网络的静态统计进行了分析,包括度分布、风险分布、平均路径长度和聚类系数。仿真结果表明,供应链复杂网络是平均路径长度短、聚类程度高的小世界网络,其度分布和风险分布服从双幂律。此外,在供应链风险扩散网络中,随着风险节点总数的增加,平均风险有降低的趋势。
{"title":"The Research of Single_Node Risk Spread in Supply Chain Complex Network Based on Fixed Risk Values","authors":"Y. Chiew, Yachao Shi","doi":"10.14355/ijcsa.2014.0303.03","DOIUrl":"https://doi.org/10.14355/ijcsa.2014.0303.03","url":null,"abstract":"Complex networks cannot only describe the complicated, asynchronous system, but also can be used to model and analyze network topological properties. Sophisticated methods for network construction and analysis exist in other fields. But until recently, researchers have few focused on the risk spread of a supply chain network. In this paper, a supply chain risk network based on single_node risk spread is modeled and the static network statistics are analyzed, including degree distribution, risk distribution, average path length and clustering coefficient. The simulation results indicate that supply chain complex network is a small-world network with short average path length and high degree of clustering, and its degree distribution and risk distribution follow a double power law. In addition, the average risk tends to decrease with the total number of risk node increase in supply chain risk spread network.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"52 1","pages":"118"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90621051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Socio-technical Ontology Engineering Methodology 走向社会技术本体工程方法论
Q4 Computer Science Pub Date : 2014-08-01 DOI: 10.14355/IJCSA.2014.0303.02
D. I. Sensuse, Mesnan Silalahi, I. Budi
The development of the semantic web technology has enabled the integration of existing systems and resources. The implementation can be seen such as in the Linked Open Data initiatives, semantic search and semantic web portal. Ontology has been playing the crucial role for the implementation of the semantic web technology, but the development of ontology itself has lagged behind. Methodologies have been developed for ontology engineering, but most of them focused on the technical rather than the socio-technical aspect. Only a few has approached socio-technically but only partially. This article will describe aspects towards a socio-technical approach in ontology engineering methodology more comprehensively. This approach is important because of the complexity and the social nature of the ontology building process. A comparative study will expose the plus and minus points of methods used within the existing methodologies from the socio-technical point of view. Then a workbench will be proposed that take socio-technical aspect within the ontology engineering methodology into account.
语义网技术的发展使现有系统和资源的集成成为可能。这种实现可以在关联开放数据计划、语义搜索和语义门户网站中看到。本体对语义网技术的实现起着至关重要的作用,但本体本身的发展相对滞后。已经为本体工程开发了方法,但大多数方法侧重于技术方面,而不是社会技术方面。只有少数人在社会技术上接近,但只是部分接近。本文将更全面地描述本体工程方法论中社会技术方法的各个方面。由于本体构建过程的复杂性和社会性,这种方法非常重要。一项比较研究将从社会技术的角度揭示现有方法中使用的方法的优点和缺点。然后,将提出一个工作台,考虑本体工程方法论中的社会技术方面。
{"title":"Towards a Socio-technical Ontology Engineering Methodology","authors":"D. I. Sensuse, Mesnan Silalahi, I. Budi","doi":"10.14355/IJCSA.2014.0303.02","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0303.02","url":null,"abstract":"The development of the semantic web technology has enabled the integration of existing systems and resources. The implementation can be seen such as in the Linked Open Data initiatives, semantic search and semantic web portal. Ontology has been playing the crucial role for the implementation of the semantic web technology, but the development of ontology itself has lagged behind. Methodologies have been developed for ontology engineering, but most of them focused on the technical rather than the socio-technical aspect. Only a few has approached socio-technically but only partially. This article will describe aspects towards a socio-technical approach in ontology engineering methodology more comprehensively. This approach is important because of the complexity and the social nature of the ontology building process. A comparative study will expose the plus and minus points of methods used within the existing methodologies from the socio-technical point of view. Then a workbench will be proposed that take socio-technical aspect within the ontology engineering methodology into account.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"44 1","pages":"111"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90829842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent Developments on Statistical and Neural Network Tools Focusing on Biodiesel Quality 生物柴油质量统计和神经网络工具的最新进展
Q4 Computer Science Pub Date : 2014-08-01 DOI: 10.14355/IJCSA.2014.0303.01
Delano Brandes Marques, A. G. O. Filho, A. Romariz, I. Viegas, Djavania A. Luz, A. K. D. B. Filho, S. Labidi, A. Ferraudo
The performance of both the traditional linear regression and Artificial Neural Network (ANN) techniques has been compared to check the validity to predict the properties of biodiesel and mixtures of diesel and biodiesel. We present on this paper a review on statistical and ANN applications to the Biodiesel quality. A case study is also presented showing the prediction of oxidative stability of Biodiesel using, for the first time, other official quality parameters instead of the chemical composition as input data. In this sense, our hope is that this paper would complement a series of recent review papers and catalyze future research in this rapidly evolving area.
比较了传统的线性回归和人工神经网络(ANN)技术在预测生物柴油及其混合物性能方面的有效性。本文综述了统计和人工神经网络在生物柴油质量分析中的应用。本文还提出了一个案例研究,首次使用其他官方质量参数而不是化学成分作为输入数据来预测生物柴油的氧化稳定性。从这个意义上说,我们希望这篇论文能够补充最近的一系列综述论文,并促进这一快速发展领域的未来研究。
{"title":"Recent Developments on Statistical and Neural Network Tools Focusing on Biodiesel Quality","authors":"Delano Brandes Marques, A. G. O. Filho, A. Romariz, I. Viegas, Djavania A. Luz, A. K. D. B. Filho, S. Labidi, A. Ferraudo","doi":"10.14355/IJCSA.2014.0303.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0303.01","url":null,"abstract":"The performance of both the traditional linear regression and Artificial Neural Network (ANN) techniques has been compared to check the validity to predict the properties of biodiesel and mixtures of diesel and biodiesel. We present on this paper a review on statistical and ANN applications to the Biodiesel quality. A case study is also presented showing the prediction of oxidative stability of Biodiesel using, for the first time, other official quality parameters instead of the chemical composition as input data. In this sense, our hope is that this paper would complement a series of recent review papers and catalyze future research in this rapidly evolving area.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"6 1","pages":"97"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85763269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ASAMO: Authentication and Secure Communication using Abstract Monitoring Objects for Mobile Grid Computing ASAMO:移动网格计算中使用抽象监控对象的认证和安全通信
Q4 Computer Science Pub Date : 2014-08-01 DOI: 10.14355/IJCSA.2014.0303.04
H. ParveenBegam, A. MalukMohamedM
The prominent feature of mobile grid computing is the collaboration of multiple entities to perform collaborative tasks using mobile devices. Currently, most of the security solutions for mobile grid environment use static set of algorithms and protocols. Despite the increased usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Our focus is to provide security and efficient power management. In this paper, a framework of dynamic secure routing protocol called Select Successive Hop Routing (SSHR) algorithm using Abstract Monitoring Objects (AMOs), Secure Service Certificates (SSC) and layer based encryption for each data transfers to improve the security level, anonymity and dynamicity of the data are proposed. This includes (i) Authentication of the mobile node (ii) Security flow between mobile nodes (iii) Saving battery power (iv) Hand-over of authentication information. The proposed framework solves the issues like asymmetry in network connectivity, computing power and mobility. The outcome is compared with certain existing security protocols and demonstrates how the proposed protocol is able to adapt itself over different conditions of the mobile device, and how it can provide a performance gain in the execution.
移动网格计算的突出特点是多个实体使用移动设备来执行协同任务。目前,针对移动网格环境的安全解决方案大多采用静态的算法和协议集。尽管移动计算的使用越来越多,但由于其固有的问题,如资源稀缺、频繁断开连接和移动性,很难充分利用其潜力。我们的重点是提供安全和高效的电源管理。本文提出了一种动态安全路由协议框架,即选择连续跳路由(SSHR)算法,该算法采用抽象监控对象(AMOs)、安全服务证书(SSC)和基于层的加密对每次数据传输进行加密,以提高数据的安全性、匿名性和动态性。包括(i)移动节点鉴权(ii)移动节点间的安全流程(iii)节省电池电量(iv)鉴权信息的传递。该框架解决了网络连接不对称、计算能力和移动性等问题。将结果与某些现有的安全协议进行比较,并演示拟议的协议如何能够适应移动设备的不同条件,以及它如何在执行中提供性能增益。
{"title":"ASAMO: Authentication and Secure Communication using Abstract Monitoring Objects for Mobile Grid Computing","authors":"H. ParveenBegam, A. MalukMohamedM","doi":"10.14355/IJCSA.2014.0303.04","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0303.04","url":null,"abstract":"The prominent feature of mobile grid computing is the collaboration of multiple entities to perform collaborative tasks using mobile devices. Currently, most of the security solutions for mobile grid environment use static set of algorithms and protocols. Despite the increased usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Our focus is to provide security and efficient power management. In this paper, a framework of dynamic secure routing protocol called Select Successive Hop Routing (SSHR) algorithm using Abstract Monitoring Objects (AMOs), Secure Service Certificates (SSC) and layer based encryption for each data transfers to improve the security level, anonymity and dynamicity of the data are proposed. This includes (i) Authentication of the mobile node (ii) Security flow between mobile nodes (iii) Saving battery power (iv) Hand-over of authentication information. The proposed framework solves the issues like asymmetry in network connectivity, computing power and mobility. The outcome is compared with certain existing security protocols and demonstrates how the proposed protocol is able to adapt itself over different conditions of the mobile device, and how it can provide a performance gain in the execution.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"69 1","pages":"127"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86401594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Approach for Subspace Clustering of High Dimensional Data 高维数据子空间聚类的一种新方法
Q4 Computer Science Pub Date : 2014-05-01 DOI: 10.14355/IJCSA.2014.0302.02
M. Suguna, S. Palaniammal
Clustering high dimensional data is an emerging research area. The similarity criterion used by the traditional clustering algorithms is inadequate in high dimensional space. Also some of the dimensions are likely to be irrelevant thus hiding a possible clustering. Subspace clustering is an extension of traditional clustering that attempts to find clusters in different subspaces within a dataset. This paper proposes an idea by giving weight to every node of a cluster in a subspace. The cluster with greatest weight value will have more number of nodes when compared to all other clusters. This method of assigning weight can be done in two ways such as top down and bottom up. A threshold value is fixed and clusters with value greater than threshold only will be taken into consideration. The discovery of clusters in selected subspaces will be made easily with the process of assigning weight to nodes. This method will surely result in reduction of search space.
高维数据聚类是一个新兴的研究领域。传统聚类算法使用的相似度准则在高维空间中存在不足。此外,一些维度可能是不相关的,因此隐藏了可能的聚类。子空间聚类是传统聚类的扩展,它试图在数据集中的不同子空间中找到聚类。本文提出了一种通过赋予子空间中聚类的每个节点权值的方法。与所有其他集群相比,权重值最大的集群将拥有更多的节点数量。这种分配权重的方法有两种方式,如自上而下和自下而上。阈值是固定的,只有大于阈值的集群才会被考虑。通过为节点分配权重的过程,可以很容易地在选定的子空间中发现簇。这种方法必然会减少搜索空间。
{"title":"A New Approach for Subspace Clustering of High Dimensional Data","authors":"M. Suguna, S. Palaniammal","doi":"10.14355/IJCSA.2014.0302.02","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0302.02","url":null,"abstract":"Clustering high dimensional data is an emerging research area. The similarity criterion used by the traditional clustering algorithms is inadequate in high dimensional space. Also some of the dimensions are likely to be irrelevant thus hiding a possible clustering. Subspace clustering is an extension of traditional clustering that attempts to find clusters in different subspaces within a dataset. This paper proposes an idea by giving weight to every node of a cluster in a subspace. The cluster with greatest weight value will have more number of nodes when compared to all other clusters. This method of assigning weight can be done in two ways such as top down and bottom up. A threshold value is fixed and clusters with value greater than threshold only will be taken into consideration. The discovery of clusters in selected subspaces will be made easily with the process of assigning weight to nodes. This method will surely result in reduction of search space.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"90 1","pages":"74-90"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77208532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1