首页 > 最新文献

Proceedings of the 6th International Conference on Information Technology and Multimedia最新文献

英文 中文
Implementation of PRINCE algorithm in FPGA PRINCE算法在FPGA中的实现
Y. Abbas, R. Jidin, N. Jamil, M. Z’aba, M. Rusli, Baraa Tariq
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows an encryption block data of 64 bits within one clock cycle, reducing the hardware area and producing a high throughput and low latency. It also showed high speed processing and consumed low power. To do this, firstly, the encryption, decryption and key schedule are all implemented with small hardware resources, Next, an efficient hardware architectural model for PRINCE algorithms was developed using very high speed integrated circuit hardware description language (VHDL). Finally, the VHDL design for PRINCE algorithm was synthesized in FPGA boards. Two FPGA boards were used in this study, which are Virtex-4 and Virtex-6. The results show a throughput of 2.03 Gbps and efficiency of 2.126 Mbps/slice for Virtex-4, whereas a throughput of 4.18 Gbps and efficiency of 8.681 Mbps/slice for Virtex-6.
本文介绍了PRINCE分组密码在现场可编程门阵列(FPGA)中的硬件实现。在许多安全应用中,加密算法的软件实现速度缓慢且效率低下。为了解决这些问题,提出了一种新的FPGA结构来提高PRINCE算法的性能和灵活性。并行计算设计允许在一个时钟周期内加密64位数据块,减少硬件面积,产生高吞吐量和低延迟。它还显示出高速处理和低功耗。为此,首先利用较少的硬件资源实现加密、解密和密钥调度,然后利用超高速集成电路硬件描述语言(VHDL)建立了PRINCE算法的高效硬件体系结构模型。最后,在FPGA板上实现了PRINCE算法的VHDL设计。本研究采用了Virtex-4和Virtex-6两块FPGA板。结果表明,Virtex-4的吞吐量为2.03 Gbps,效率为2.126 Mbps/片,而Virtex-6的吞吐量为4.18 Gbps,效率为8.681 Mbps/片。
{"title":"Implementation of PRINCE algorithm in FPGA","authors":"Y. Abbas, R. Jidin, N. Jamil, M. Z’aba, M. Rusli, Baraa Tariq","doi":"10.1109/ICIMU.2014.7066593","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066593","url":null,"abstract":"This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows an encryption block data of 64 bits within one clock cycle, reducing the hardware area and producing a high throughput and low latency. It also showed high speed processing and consumed low power. To do this, firstly, the encryption, decryption and key schedule are all implemented with small hardware resources, Next, an efficient hardware architectural model for PRINCE algorithms was developed using very high speed integrated circuit hardware description language (VHDL). Finally, the VHDL design for PRINCE algorithm was synthesized in FPGA boards. Two FPGA boards were used in this study, which are Virtex-4 and Virtex-6. The results show a throughput of 2.03 Gbps and efficiency of 2.126 Mbps/slice for Virtex-4, whereas a throughput of 4.18 Gbps and efficiency of 8.681 Mbps/slice for Virtex-6.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A review of security attacks on IEC61850 substation automation system network IEC61850变电站自动化系统网络安全攻击综述
Muhammad Talha Abdul Rashid, S. Yussof, Yunus Yusoff, Roslan Ismail
Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.
尽管IEC61850变电站可以提供比传统变电站更多的优势,但出于安全考虑,供电公司对其实施持谨慎态度。事实上,研究人员已经确定了IEC61850标准中的许多安全漏洞和弱点,例如GOOSE消息中缺乏加密,IEC61850网络中缺乏入侵检测系统的实现,以及IEC61850变电站网络中没有防火墙的实现。通过利用这些漏洞,研究人员还发现了一些可以在IEC61850变电站网络上发起的安全攻击。这些攻击可以分为针对IEC61850网络的常见网络安全攻击和利用IEC61850组播消息的安全攻击两种。本文对这些安全攻击进行了回顾,包括攻击是如何进行的以及它们可能造成的后续损害。
{"title":"A review of security attacks on IEC61850 substation automation system network","authors":"Muhammad Talha Abdul Rashid, S. Yussof, Yunus Yusoff, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066594","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066594","url":null,"abstract":"Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its implementation due to security concerns. Indeed, researchers have identified a number of security vulnerabilities and weaknesses in the IEC61850 standard such as the lack of encryption used in the GOOSE messages, lack of intrusion detection system implementation in IEC61850 network, and no firewall implementation inside IEC61850 substation network. By exploiting these vulnerabilities, researchers have also discovered a number of security attacks that can be launched on IEC61850 substation network. These attacks can be categorized into two, which are common network security attacks on IEC61850 network and security attacks that exploit the IEC61850 multicast messages. This paper provides a review of these security attacks in terms of how the attacks are conducted and the subsequent damages that they may cause.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Application of J48 and bagging for classification of vertebral column pathologies J48和套袋法在脊柱病理分类中的应用
Indriana Hidayah, Erna P. Adhistya, Monica Agustami Kristy
Disk hernia and spondylolisthesis are examples of pathologies on vertebral column. These traumas on vertebral column can affect spinal cord capability to send and receive messages from brain to the body systems that control sensor and motor. Therefore, accuracy and timeliness of diagnosis for these pathologies are critical. Hence, a classification system can assist radiologists to improve productivity and the quality of diagnosis. In general, Indonesia's public hospitals have many patients, thus, such classification system will be a great benefit. However, research about pathology of skeletal system classification in Indonesia is rare due to the unavailability of numerical database which quantitatively represents the disease. In this research, dataset of vertebral column from UCI Machine Learning was used to develop an optimum classification model. We ensemble decision tree (J48) and bagging as the classification model. Decision tree was chosen as the base learner due to its simplicity and interpretability. In addition, bagging was used to stable the prediction of new test instances. By applying 10-fold cross-validation we calculated true-positive rate (TP rate), false-positive (FP rate), accuracy parameters, and ROC AUC. The results showed that J48 and Bagging has better performance than J48 alone. The quantitative evaluation showed accuracy of J48 and Bagging is 85.1613%, whereas accuracy of J48 was 81.6129%.
椎间盘突出和脊柱滑脱是脊柱病变的例子。脊柱上的这些创伤会影响脊髓向控制传感器和运动的身体系统发送和接收来自大脑的信息的能力。因此,诊断这些病理的准确性和及时性是至关重要的。因此,分类系统可以帮助放射科医生提高工作效率和诊断质量。总的来说,印度尼西亚的公立医院病人很多,因此,这样的分类系统将是一个很大的好处。然而,由于无法获得定量代表该疾病的数字数据库,印度尼西亚对骨骼系统分类的病理学研究很少。本研究利用UCI Machine Learning提供的脊柱数据集建立了一个最优分类模型。我们将决策树(J48)和bagging集成为分类模型。基于决策树的简单性和可解释性,选择决策树作为基础学习器。此外,套袋法还用于稳定新测试实例的预测。通过10倍交叉验证,我们计算了真阳性率(TP率)、假阳性率(FP率)、准确度参数和ROC AUC。结果表明,J48和Bagging复合处理比单独使用J48处理效果更好。定量评价表明,J48和Bagging的准确度为85.1613%,而J48的准确度为81.6129%。
{"title":"Application of J48 and bagging for classification of vertebral column pathologies","authors":"Indriana Hidayah, Erna P. Adhistya, Monica Agustami Kristy","doi":"10.1109/ICIMU.2014.7066651","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066651","url":null,"abstract":"Disk hernia and spondylolisthesis are examples of pathologies on vertebral column. These traumas on vertebral column can affect spinal cord capability to send and receive messages from brain to the body systems that control sensor and motor. Therefore, accuracy and timeliness of diagnosis for these pathologies are critical. Hence, a classification system can assist radiologists to improve productivity and the quality of diagnosis. In general, Indonesia's public hospitals have many patients, thus, such classification system will be a great benefit. However, research about pathology of skeletal system classification in Indonesia is rare due to the unavailability of numerical database which quantitatively represents the disease. In this research, dataset of vertebral column from UCI Machine Learning was used to develop an optimum classification model. We ensemble decision tree (J48) and bagging as the classification model. Decision tree was chosen as the base learner due to its simplicity and interpretability. In addition, bagging was used to stable the prediction of new test instances. By applying 10-fold cross-validation we calculated true-positive rate (TP rate), false-positive (FP rate), accuracy parameters, and ROC AUC. The results showed that J48 and Bagging has better performance than J48 alone. The quantitative evaluation showed accuracy of J48 and Bagging is 85.1613%, whereas accuracy of J48 was 81.6129%.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116429943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A review of factors that influenced online trust in social commerce 社交商务中影响在线信任的因素综述
A. Noor, R. Sulaiman, A. Abu Bakar
The recent advancements in social media and electronic commerce have produced a new business model called social commerce. This new business model has facilitated online business transactions via social media. Despite the advancement of technology, the issue of online trust has increased in social commerce. The purpose of this paper is to identify the factors that influence online trust in social commerce. Seven models related to online trust in electronic commerce, electronic business, and social commerce were reviewed and analyzed. This has resulted in identifying six factors, which are usefulness, ease of use, security, privacy, website design, and electronic word of mouth; as the most influential factors that influence online trust in social commerce. Discussion and direction of future work are pointed out in this paper.
最近社交媒体和电子商务的进步产生了一种叫做社交商务的新商业模式。这种新的商业模式促进了通过社交媒体进行的在线商业交易。尽管技术进步了,但在社交商务中,在线信任的问题有所增加。本文的目的是确定影响社交商务在线信任的因素。对电子商务、电子商务和社交商务中与在线信任相关的七个模型进行了回顾和分析。这就确定了6个因素,即实用性、易用性、安全性、隐私性、网站设计和电子口碑;作为影响社交商务网络信任的最重要因素。并指出了今后研究的方向。
{"title":"A review of factors that influenced online trust in social commerce","authors":"A. Noor, R. Sulaiman, A. Abu Bakar","doi":"10.1109/ICIMU.2014.7066615","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066615","url":null,"abstract":"The recent advancements in social media and electronic commerce have produced a new business model called social commerce. This new business model has facilitated online business transactions via social media. Despite the advancement of technology, the issue of online trust has increased in social commerce. The purpose of this paper is to identify the factors that influence online trust in social commerce. Seven models related to online trust in electronic commerce, electronic business, and social commerce were reviewed and analyzed. This has resulted in identifying six factors, which are usefulness, ease of use, security, privacy, website design, and electronic word of mouth; as the most influential factors that influence online trust in social commerce. Discussion and direction of future work are pointed out in this paper.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117078212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Comparative analysis of multiple kernel learning on learning emotion recognition 多核学习在学习情绪识别中的比较分析
O. K. Akputu, Yunli Lee, K. Seng
Local appearance descriptors are widely used on facial emotion recognition tasks. With these descriptors, image filters, such as Gabor wavelet or local binary patterns (LBP) are applied on the whole or specific regions of the face to extract facial appearance changes. But it is also clear that beside feature descriptor; choice of suitable learning method that integrates feature novelty is vital. The multiple kernels learning (MKL) framework reportedly shows promising performances on problems of this nature. However, most MKL studies in object recognition domain provide conflicting reports about recognition performances of MKL. We resolve such conflicts by motivating a comparative analysis of MKL using appearance descriptors for facial emotion recognition-in challenging learning setting. Moreover, we introduce a simulated learning emotion (SLE) dataset for the first time in model performance evaluation. We conclude that given sufficient training elements (examples) with efficient feature descriptor, the rapper methods of Semi-infinite programming MKL (SIP-MKL) and SimpleMKL frameworks are relatively efficient on facial emotion recognition task, compare to other kernel combination schemes. Nevertheless we opine that average MKL performance accuracy, especially on learning facial emotion dataset, remains unsatisfactory (around 56%).
局部外观描述符广泛应用于面部情绪识别任务。利用这些描述符,将图像滤波器,如Gabor小波或局部二值模式(LBP)应用于面部的整个或特定区域,以提取面部外观变化。但很明显,除了特征描述符;选择合适的学习方法,结合特征的新颖性是至关重要的。据报道,多核学习(MKL)框架在这种性质的问题上表现出了很好的性能。然而,大多数目标识别领域的MKL研究对MKL的识别性能给出了相互矛盾的报告。我们通过在具有挑战性的学习环境中使用面部情绪识别的外观描述符来激励MKL的比较分析来解决这种冲突。此外,我们首次在模型性能评估中引入了模拟学习情绪(SLE)数据集。我们得出结论,在给定足够的训练元素(样例)和有效的特征描述符的情况下,半无限编程MKL (SIP-MKL)和SimpleMKL框架的rapper方法与其他核组合方案相比,在面部情绪识别任务上相对高效。然而,我们认为MKL的平均性能准确性,特别是在学习面部情绪数据集上,仍然不令人满意(约56%)。
{"title":"Comparative analysis of multiple kernel learning on learning emotion recognition","authors":"O. K. Akputu, Yunli Lee, K. Seng","doi":"10.1109/ICIMU.2014.7066659","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066659","url":null,"abstract":"Local appearance descriptors are widely used on facial emotion recognition tasks. With these descriptors, image filters, such as Gabor wavelet or local binary patterns (LBP) are applied on the whole or specific regions of the face to extract facial appearance changes. But it is also clear that beside feature descriptor; choice of suitable learning method that integrates feature novelty is vital. The multiple kernels learning (MKL) framework reportedly shows promising performances on problems of this nature. However, most MKL studies in object recognition domain provide conflicting reports about recognition performances of MKL. We resolve such conflicts by motivating a comparative analysis of MKL using appearance descriptors for facial emotion recognition-in challenging learning setting. Moreover, we introduce a simulated learning emotion (SLE) dataset for the first time in model performance evaluation. We conclude that given sufficient training elements (examples) with efficient feature descriptor, the rapper methods of Semi-infinite programming MKL (SIP-MKL) and SimpleMKL frameworks are relatively efficient on facial emotion recognition task, compare to other kernel combination schemes. Nevertheless we opine that average MKL performance accuracy, especially on learning facial emotion dataset, remains unsatisfactory (around 56%).","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arabic keyphrases extraction using a hybrid of statistical and machine learning methods 使用统计和机器学习方法的混合阿拉伯语关键短语提取
Nidaa Ghalib Ali, N. Omar
Keyphrases are single-word or multi-word lexemes that concisely and accurate describe the subject or side of the subject discuss in a document. Manually assigning keyphrases is tedious and time consuming, especially because of Web proliferation. Thus, automatic keyphrase generation systems are urgently needed. This study proposes a keyphrase extraction method that combines several keyphrase extraction methods with the use of machine learning approaches (linear logistic regression, linear discriminant analysis, and support vector machines). The proposed methods use the output of several keyphrase extraction methods as input features for a machine learning algorithm, which then determines whether each term is a keyphrase. Results show that the SVM algorithm achieves the best performance with F1-measures 88.31%. These values are relatively high and comparable with those of previous keyphrase extraction models for the Arabic language.
关键词是一个单字或多字的词汇,它简明准确地描述了文档中讨论的主题或主题的侧面。手动分配关键字是乏味和耗时的,特别是因为Web的扩散。因此,迫切需要自动关键字生成系统。本研究提出了一种关键词提取方法,该方法结合了几种关键词提取方法和机器学习方法(线性逻辑回归、线性判别分析和支持向量机)。提出的方法使用几种关键字提取方法的输出作为机器学习算法的输入特征,然后确定每个术语是否为关键字。结果表明,支持向量机算法在f1测度下达到了88.31%的最佳性能。这些值相对较高,可与先前的阿拉伯语关键短语提取模型相媲美。
{"title":"Arabic keyphrases extraction using a hybrid of statistical and machine learning methods","authors":"Nidaa Ghalib Ali, N. Omar","doi":"10.1109/ICIMU.2014.7066645","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066645","url":null,"abstract":"Keyphrases are single-word or multi-word lexemes that concisely and accurate describe the subject or side of the subject discuss in a document. Manually assigning keyphrases is tedious and time consuming, especially because of Web proliferation. Thus, automatic keyphrase generation systems are urgently needed. This study proposes a keyphrase extraction method that combines several keyphrase extraction methods with the use of machine learning approaches (linear logistic regression, linear discriminant analysis, and support vector machines). The proposed methods use the output of several keyphrase extraction methods as input features for a machine learning algorithm, which then determines whether each term is a keyphrase. Results show that the SVM algorithm achieves the best performance with F1-measures 88.31%. These values are relatively high and comparable with those of previous keyphrase extraction models for the Arabic language.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Frequent pattern mining in mobile devices: A feasibility study 移动设备中的频繁模式挖掘:可行性研究
M. H. Rehman, C. Liew, T. Wah
The availability of computational power in mobile devices is key-enabler for Mobile Data Mining (MDM) at user-premises. Alternately, resource-constraints like limited energy, narrow bandwidth, and small screens challenge in adoption of MDM. Currently, MDM is based on light-weight algorithms that are adaptive in resource-constrained environments but a study to evaluate the performance of general algorithms still lacks in the literature. To this end, we have studied six Frequent Pattern Mining (FPM) algorithms and deployed them in mobile devices to evaluate the feasibility and highlighted the associated challenges. The experiments were performed on real and synthetic data sets strictly in android-based mobile device and compared with PC-based setup. The experimental results show that FPM algorithms can leverage MDM after tuning some basic parameters.
移动设备中计算能力的可用性是在用户驻地实现移动数据挖掘(MDM)的关键因素。另外,有限的能源、狭窄的带宽和小屏幕等资源约束也会给MDM的采用带来挑战。目前,MDM基于轻量级算法,可以在资源受限的环境中自适应,但文献中仍然缺乏对通用算法性能的评估研究。为此,我们研究了六种频繁模式挖掘(FPM)算法,并将它们部署在移动设备中,以评估其可行性并强调相关的挑战。在基于android的移动设备上严格在真实数据集和合成数据集上进行了实验,并与基于pc的设置进行了比较。实验结果表明,FPM算法在调优一些基本参数后可以利用MDM。
{"title":"Frequent pattern mining in mobile devices: A feasibility study","authors":"M. H. Rehman, C. Liew, T. Wah","doi":"10.1109/ICIMU.2014.7066658","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066658","url":null,"abstract":"The availability of computational power in mobile devices is key-enabler for Mobile Data Mining (MDM) at user-premises. Alternately, resource-constraints like limited energy, narrow bandwidth, and small screens challenge in adoption of MDM. Currently, MDM is based on light-weight algorithms that are adaptive in resource-constrained environments but a study to evaluate the performance of general algorithms still lacks in the literature. To this end, we have studied six Frequent Pattern Mining (FPM) algorithms and deployed them in mobile devices to evaluate the feasibility and highlighted the associated challenges. The experiments were performed on real and synthetic data sets strictly in android-based mobile device and compared with PC-based setup. The experimental results show that FPM algorithms can leverage MDM after tuning some basic parameters.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analog Network Coding for chain topology in non-mutual transmission 非互传链拓扑的模拟网络编码
Vala Saleh, M. Rusli, Syed Khaleel Ahmed, H. Mohamad
In this paper we formulate Network Coding (NC) and Analog Network Coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investigated. Our formulations demonstrate the benefit of NC and ANC over traditional approaches which depend on the number of transmission packets and the number of timeslots required for packets transmission in broadcasting scenarios. The advantage of this analytical approach is independence with respect to running a network simulation in order to evaluate the effect of the network coding schemes on the networks before proceeding to design or system simulation. The result shows ANC can improve capacity in the chain network as much as 50%.
在本文中,我们制定网络编码(NC)和模拟网络编码(ANC)使用分析模型来量化ANC性能参数。为此,研究了非互传输中的链拓扑结构。我们的公式展示了NC和ANC相对于传统方法的优势,传统方法依赖于广播场景中传输数据包的数量和数据包传输所需的时隙数量。这种分析方法的优点是独立于运行网络仿真,以便在进行设计或系统仿真之前评估网络编码方案对网络的影响。结果表明,ANC可以将连锁网络的容量提高50%。
{"title":"Analog Network Coding for chain topology in non-mutual transmission","authors":"Vala Saleh, M. Rusli, Syed Khaleel Ahmed, H. Mohamad","doi":"10.1109/ICIMU.2014.7066608","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066608","url":null,"abstract":"In this paper we formulate Network Coding (NC) and Analog Network Coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investigated. Our formulations demonstrate the benefit of NC and ANC over traditional approaches which depend on the number of transmission packets and the number of timeslots required for packets transmission in broadcasting scenarios. The advantage of this analytical approach is independence with respect to running a network simulation in order to evaluate the effect of the network coding schemes on the networks before proceeding to design or system simulation. The result shows ANC can improve capacity in the chain network as much as 50%.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125323656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of flood management governance framework in malaysia and selected countries 对马来西亚和选定国家的洪水管理治理框架的审查
A. A. Latif, N. Arshad
Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an effective flood management (FM) practice in order to reduce the impact caused by flood. This article seeks to examine the proper governance framework needed in managing flood. The aim of this paper is to, namely: identify the current governance structure in several selected countries and identify the challenges associated with the structure. Results from this comparative study will be used in recommending the best form of a FM framework.
由于地理位置和城市发展不当,马来西亚经常遭受洪灾。基于这种情况,人们认识到马来西亚必须建立有效的洪水管理(FM)实践,以减少洪水造成的影响。本文试图检查管理洪水所需的适当治理框架。本文的目的是:确定几个选定国家当前的治理结构,并确定与该结构相关的挑战。这项比较研究的结果将用于推荐FM框架的最佳形式。
{"title":"A review of flood management governance framework in malaysia and selected countries","authors":"A. A. Latif, N. Arshad","doi":"10.1109/ICIMU.2014.7066626","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066626","url":null,"abstract":"Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an effective flood management (FM) practice in order to reduce the impact caused by flood. This article seeks to examine the proper governance framework needed in managing flood. The aim of this paper is to, namely: identify the current governance structure in several selected countries and identify the challenges associated with the structure. Results from this comparative study will be used in recommending the best form of a FM framework.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission MANET应急救援任务中异构访问控制模型的认证机制
Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail
With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.
随着便携式无线设备的大量增加,移动计算得到了巨大的进步,移动自组网(manet)成为无线网络通信领域的一个重要方面。通过一些独特的功能,如可伸缩性、容错和自治系统,可以在有或没有任何可信权威的情况下设置网络。这使得MANET适用于应急和救援行动。在紧急情况下,需要与救援人员共享数据。在访问应急服务中的信息之前,需要对MANET中的节点进行身份验证。然而,由于MANET继承的无线特性,节点容易受到攻击,因此需要一种安全的身份验证机制,因为身份验证是第一防御机制。本文对MANET中的认证模型进行了回顾,并提出了一种适合于我们提出的访问控制模型的模型——异构访问控制模型(HACM)。HACM是基于组的访问控制模型(GBAC)的扩展模型,该模型根据应急服务中救援成员的组角色(GR)和用户角色(UR)将信息访问分为一般访问和敏感访问。HACM模型引入了异构访问级别(HLA),其中对信息的访问基于信息敏感级别,该级别与在应急区域创建的组中的用户角色相映射。信息敏感程度取决于紧急情况的灾难性程度或严重程度。
{"title":"An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission","authors":"Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066611","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066611","url":null,"abstract":"With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 6th International Conference on Information Technology and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1