首页 > 最新文献

Proceedings of the The International Conference on Engineering & MIS 2015最新文献

英文 中文
Optimal Trajectory Planning under Kino-dynamics Constraints for a 6-DOF PUMA 560 基于kino动力学约束的6自由度PUMA 560最优轨迹规划
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833049
Nadir Bendali, M. Ouali, Kamel Ghellal
We present in this paper an effective method to deal with the problem of the trajectories planning in time-efforts quadratic optimal of the robots manipulators in the point to point tasks. The technique suggested in this work, consists at the beginning to standardizing the time scale then to break up the trajectory into two functions which are modelled by Cubic Splines (Natural and Clamped) according to the properties of each function. Finally, the problem of optimization is solved by using the Genetic Algorithms to find the optimal trajectory. An algorithm is developed which makes it possible to minimize a function objective which represents a weighting between the transfer time and the efforts of the actuators, with the satisfaction of the geometrical, kinematics and dynamic constraints. Results on a robot PUMA560 6R are presented to illustrate the effectiveness of this technique.
本文提出了一种有效的方法来解决点到点任务中机器人操作手的时间-精力二次最优轨迹规划问题。本文提出的方法是首先标准化时间尺度,然后根据每个函数的性质将轨迹分解为两个函数,分别用三次样条(自然样条和箝位样条)建模。最后,利用遗传算法寻找最优轨迹,解决了优化问题。在满足几何、运动学和动力学约束的情况下,开发了一种算法,使传递时间和执行器努力之间的权重函数目标最小化。以puma5606r机器人为例,验证了该方法的有效性。
{"title":"Optimal Trajectory Planning under Kino-dynamics Constraints for a 6-DOF PUMA 560","authors":"Nadir Bendali, M. Ouali, Kamel Ghellal","doi":"10.1145/2832987.2833049","DOIUrl":"https://doi.org/10.1145/2832987.2833049","url":null,"abstract":"We present in this paper an effective method to deal with the problem of the trajectories planning in time-efforts quadratic optimal of the robots manipulators in the point to point tasks. The technique suggested in this work, consists at the beginning to standardizing the time scale then to break up the trajectory into two functions which are modelled by Cubic Splines (Natural and Clamped) according to the properties of each function. Finally, the problem of optimization is solved by using the Genetic Algorithms to find the optimal trajectory. An algorithm is developed which makes it possible to minimize a function objective which represents a weighting between the transfer time and the efforts of the actuators, with the satisfaction of the geometrical, kinematics and dynamic constraints. Results on a robot PUMA560 6R are presented to illustrate the effectiveness of this technique.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"22 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity Measure 基于时间模式挖掘的相似度量入侵检测方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833077
V. Radhakrishna, P. Kumar, V. Janaki
In this paper, the major objective is to identify the intrusion using temporal pattern mining. The idea is to find the normal system call patterns and use these patterns to identify abnormal system call patterns. For finding the normal system calls we use the concept of association patterns and find the temporal association patterns. The reference sequence is used to obtain the temporal association patterns satisfying the user defined threshold. To find the temporal association system call patterns, we apply our novel procedure which performs only a single database scan. This reduces the extra overhead in generating the frequent system call patterns minimizing the space complexity. To find the similarity or dissimilarity values we use our proposed measure. The results show that the proposed approach overcomes the disadvantages of the traditional distance measures.
本文的主要目标是利用时间模式挖掘来识别入侵。其思想是找到正常的系统调用模式,并使用这些模式来识别异常的系统调用模式。为了找到正常的系统调用,我们使用关联模式的概念并找到时间关联模式。该参考序列用于获得满足用户定义阈值的时间关联模式。为了找到时态关联系统调用模式,我们应用了我们的新过程,它只执行一次数据库扫描。这减少了生成频繁系统调用模式的额外开销,最大限度地减少了空间复杂性。为了找到相似或不相似的值,我们使用我们提出的测量方法。结果表明,该方法克服了传统距离测量方法的缺点。
{"title":"A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity Measure","authors":"V. Radhakrishna, P. Kumar, V. Janaki","doi":"10.1145/2832987.2833077","DOIUrl":"https://doi.org/10.1145/2832987.2833077","url":null,"abstract":"In this paper, the major objective is to identify the intrusion using temporal pattern mining. The idea is to find the normal system call patterns and use these patterns to identify abnormal system call patterns. For finding the normal system calls we use the concept of association patterns and find the temporal association patterns. The reference sequence is used to obtain the temporal association patterns satisfying the user defined threshold. To find the temporal association system call patterns, we apply our novel procedure which performs only a single database scan. This reduces the extra overhead in generating the frequent system call patterns minimizing the space complexity. To find the similarity or dissimilarity values we use our proposed measure. The results show that the proposed approach overcomes the disadvantages of the traditional distance measures.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134222910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Clustering Software Project Components for Strategic Decisions and Building Reuse Libraries 集群软件项目组件的战略决策和构建重用库
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833075
C. Srinivas, V. Radhakrishna, C. V. Rao
A Software Repository is a collection of function codes, library files, software requirement specification documents, software design patterns, architectural specifications to name a few. Software Engineers and Programmers analyse, design, implement, develop and build the software libraries, software projects as a continuous process. Mining Software Components for efficient reuse is the current topic of interest among researchers working in the areas of Software Reuse and Information Retrieval. A comparatively less research is contributed in this direction and has a good scope for research. In this paper, the main idea is to cluster the software projects, software components from the available repository and use these clusters in choosing the suitable software component quickly and efficiently. The software clustering process may also be used to estimate and know the hidden knowledge of software systems. We use the similarity function of our previous work submitted at the ACM ISDOC Conference [12] for the purpose of clustering the software projects and software components. The clusters formed may be used to estimate the hidden knowledge and behavior of software projects. The approach carried out is a feature vector based approach.
软件存储库是功能代码、库文件、软件需求规范文档、软件设计模式、架构规范等的集合。软件工程师和程序员分析,设计,实施,开发和构建软件库,软件项目作为一个持续的过程。挖掘有效重用的软件组件是当前软件重用和信息检索领域研究人员感兴趣的话题。这方面的研究相对较少,有很好的研究空间。本文的主要思想是从可用的存储库中对软件项目和软件组件进行集群,并利用这些集群快速有效地选择合适的软件组件。软件聚类过程还可用于估计和了解软件系统的隐藏知识。我们使用我们之前在ACM ISDOC会议上提交的工作的相似性函数[12]来聚类软件项目和软件组件。所形成的聚类可用于估计软件项目的隐藏知识和行为。所采用的方法是一种基于特征向量的方法。
{"title":"Clustering Software Project Components for Strategic Decisions and Building Reuse Libraries","authors":"C. Srinivas, V. Radhakrishna, C. V. Rao","doi":"10.1145/2832987.2833075","DOIUrl":"https://doi.org/10.1145/2832987.2833075","url":null,"abstract":"A Software Repository is a collection of function codes, library files, software requirement specification documents, software design patterns, architectural specifications to name a few. Software Engineers and Programmers analyse, design, implement, develop and build the software libraries, software projects as a continuous process. Mining Software Components for efficient reuse is the current topic of interest among researchers working in the areas of Software Reuse and Information Retrieval. A comparatively less research is contributed in this direction and has a good scope for research. In this paper, the main idea is to cluster the software projects, software components from the available repository and use these clusters in choosing the suitable software component quickly and efficiently. The software clustering process may also be used to estimate and know the hidden knowledge of software systems. We use the similarity function of our previous work submitted at the ACM ISDOC Conference [12] for the purpose of clustering the software projects and software components. The clusters formed may be used to estimate the hidden knowledge and behavior of software projects. The approach carried out is a feature vector based approach.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Strict Strong Graph Coloring: Algorithms and Applications 严格强图着色:算法和应用
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833020
Meriem Bensouyad, Nousseiba Guidoum, Djamel Eddine Saidouni
This paper addresses a recent combinatorial optimization problem called the Strict Strong graph coloring. This new coloring parameter investigates the use of dominance relation between graph vertices and color classes. This kind of coloring has been defined by Haddad and Kheddouci. It consists in properly coloring the graph in a way each vertex dominates at least one color class. In this paper, we recall some fundamental concepts, bounds and theorems related to the strict strong coloring. Also, we show its usefulness to deal with real world applications and we provide a critical review of the existing approaches dealing with such NP complete problem.
本文研究了一个新的组合优化问题——严格强图着色问题。这个新的着色参数研究了图形顶点和颜色类之间的优势关系的使用。这种颜色是由Haddad和Kheddouci定义的。它包括以一种每个顶点至少支配一个颜色类的方式为图正确上色。本文回顾了与严格强着色有关的一些基本概念、界和定理。此外,我们还展示了它在处理现实世界应用中的有用性,并对处理此类NP完全问题的现有方法进行了批判性回顾。
{"title":"Strict Strong Graph Coloring: Algorithms and Applications","authors":"Meriem Bensouyad, Nousseiba Guidoum, Djamel Eddine Saidouni","doi":"10.1145/2832987.2833020","DOIUrl":"https://doi.org/10.1145/2832987.2833020","url":null,"abstract":"This paper addresses a recent combinatorial optimization problem called the Strict Strong graph coloring. This new coloring parameter investigates the use of dominance relation between graph vertices and color classes. This kind of coloring has been defined by Haddad and Kheddouci. It consists in properly coloring the graph in a way each vertex dominates at least one color class. In this paper, we recall some fundamental concepts, bounds and theorems related to the strict strong coloring. Also, we show its usefulness to deal with real world applications and we provide a critical review of the existing approaches dealing with such NP complete problem.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Research Issues in Mining Medical Datasets 探索挖掘医疗数据集的研究问题
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833078
B. Bai, N. Mangathayaru, B. Rani
Mining medical datasets is a challenging problem before data mining researchers as these datasets have several hidden challenges compared to conventional datasets. Starting from the collection of samples through field experiments and clinical trials to performing classification, there are numerous challenges at every stage in the mining process. The preprocessing phase in the mining process itself is a challenging issue when, we work on medical datasets. The main contribution of this research includes the detailed survey carried out and brings out the discussion that is not initiated in research papers published in the fields of medical and health informatics. We made a sincere effort towards making this possible and aim to bring out the various research issues associated with the disease prediction from the perspective of data mining. We also discuss the nature of medical disease datasets before switching our attention towards prediction or classification.
对于数据挖掘研究人员来说,挖掘医疗数据集是一个具有挑战性的问题,因为与传统数据集相比,这些数据集存在一些隐藏的挑战。从通过现场实验和临床试验收集样品到进行分类,在挖掘过程的每个阶段都面临着许多挑战。当我们处理医疗数据集时,挖掘过程中的预处理阶段本身就是一个具有挑战性的问题。本研究的主要贡献包括进行了详细的调查,并提出了在医学和卫生信息学领域发表的研究论文中没有提出的讨论。我们为实现这一目标做出了真诚的努力,并旨在从数据挖掘的角度提出与疾病预测相关的各种研究问题。在将注意力转向预测或分类之前,我们还讨论了医学疾病数据集的性质。
{"title":"Exploring Research Issues in Mining Medical Datasets","authors":"B. Bai, N. Mangathayaru, B. Rani","doi":"10.1145/2832987.2833078","DOIUrl":"https://doi.org/10.1145/2832987.2833078","url":null,"abstract":"Mining medical datasets is a challenging problem before data mining researchers as these datasets have several hidden challenges compared to conventional datasets. Starting from the collection of samples through field experiments and clinical trials to performing classification, there are numerous challenges at every stage in the mining process. The preprocessing phase in the mining process itself is a challenging issue when, we work on medical datasets. The main contribution of this research includes the detailed survey carried out and brings out the discussion that is not initiated in research papers published in the fields of medical and health informatics. We made a sincere effort towards making this possible and aim to bring out the various research issues associated with the disease prediction from the perspective of data mining. We also discuss the nature of medical disease datasets before switching our attention towards prediction or classification.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud 开源云环境下软件组件的时间波监控与应急自适应
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833055
Lamisha Rawshan, K. Sakib, A. Imran
Optimized resource utilization and low cost of service has enabled the cloud to become a popular service in today's world. However, rapid scaling, continuous attacks from hackers, dynamic resource provisioning and distributed nature has made it a complex system to manually monitor and manage by system administrators. This paper proposes an effective time-waved framework for monitoring the cloud and reporting undesirable activities with minimum time delay. Next, it presents a mechanism to self-adapt the attacked modules through allocation of healthy ancillary resources. Performance analysis of the proposed framework yields desirable time complexities of 17.0, 26.6, 27.3 and 18.6 seconds for 4 types of attacks tested here. Also, replacing paralyzed cloud virtual machines (vm) with healthy ones requires 8.4 seconds on average, resulting in desirable performance. The experimentation on open source platform show that the proposed schemes enable better monitoring of cloud services.
优化的资源利用率和低成本的服务使云成为当今世界流行的服务。然而,快速扩展、黑客的持续攻击、动态资源配置和分布式特性使其成为一个复杂的系统,需要系统管理员手动监控和管理。本文提出了一种有效的时间波框架,用于监测云并以最小的时延报告不良活动。其次,提出了一种通过分配健康的辅助资源来自适应被攻击模块的机制。对提议的框架的性能分析得出,对于这里测试的4种攻击类型,理想的时间复杂度分别为17.0、26.6、27.3和18.6秒。此外,将瘫痪的云虚拟机替换为健康的云虚拟机平均需要8.4秒,从而获得理想的性能。在开源平台上的实验表明,所提出的方案能够更好地监控云服务。
{"title":"Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud","authors":"Lamisha Rawshan, K. Sakib, A. Imran","doi":"10.1145/2832987.2833055","DOIUrl":"https://doi.org/10.1145/2832987.2833055","url":null,"abstract":"Optimized resource utilization and low cost of service has enabled the cloud to become a popular service in today's world. However, rapid scaling, continuous attacks from hackers, dynamic resource provisioning and distributed nature has made it a complex system to manually monitor and manage by system administrators. This paper proposes an effective time-waved framework for monitoring the cloud and reporting undesirable activities with minimum time delay. Next, it presents a mechanism to self-adapt the attacked modules through allocation of healthy ancillary resources. Performance analysis of the proposed framework yields desirable time complexities of 17.0, 26.6, 27.3 and 18.6 seconds for 4 types of attacks tested here. Also, replacing paralyzed cloud virtual machines (vm) with healthy ones requires 8.4 seconds on average, resulting in desirable performance. The experimentation on open source platform show that the proposed schemes enable better monitoring of cloud services.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function 基于高斯函数的入侵检测改进k-均值聚类算法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833082
G. R. Kumar, N. Mangathayaru, G. Narasimha
In this paper the major objective is to design and analyze the suitability of Gaussian similarity measure for intrusion detection. The objective is to use this as a distance measure to find the distance between any two data samples of training set such as DARPA Data Set, KDD Data Set. This major objective is to use this measure as a distance metric when applying k-means algorithm. The novelty of this approach is making use of the proposed distance function as part of k-means algorithm so as to obtain disjoint clusters. This is followed by a case study, which demonstrates the process of Intrusion Detection. The proposed similarity has fixed upper and lower bounds.
本文的主要目的是设计和分析高斯相似度量在入侵检测中的适用性。目标是使用它作为距离度量来找到训练集(如DARPA数据集,KDD数据集)的任意两个数据样本之间的距离。这个主要目标是在应用k-means算法时使用这个度量作为距离度量。该方法的新颖之处在于利用所提出的距离函数作为k-means算法的一部分,从而获得不相交的聚类。接下来是一个案例研究,演示了入侵检测的过程。所提出的相似度有固定的上下界。
{"title":"An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function","authors":"G. R. Kumar, N. Mangathayaru, G. Narasimha","doi":"10.1145/2832987.2833082","DOIUrl":"https://doi.org/10.1145/2832987.2833082","url":null,"abstract":"In this paper the major objective is to design and analyze the suitability of Gaussian similarity measure for intrusion detection. The objective is to use this as a distance measure to find the distance between any two data samples of training set such as DARPA Data Set, KDD Data Set. This major objective is to use this measure as a distance metric when applying k-means algorithm. The novelty of this approach is making use of the proposed distance function as part of k-means algorithm so as to obtain disjoint clusters. This is followed by a case study, which demonstrates the process of Intrusion Detection. The proposed similarity has fixed upper and lower bounds.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Secure Data Transmission Using MS- Extended 8-bit ASCII Character Set 使用MS扩展的8位ASCII字符集的安全数据传输
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833073
B. Sruthi, V. Radhakrishna
Cryptography plays a crucial role in providing security to the sensitive data and information such as medical data. One method to handle sensitive data when it needs to be transmitted from source to the destination is to encrypt the same. Traditionally, Hill Cipher is used to encrypt the data. which uses only 26 characters in English alphabet. So, it is vulnerable to any known plain text attack. Hill Cipher is modified by making use of a set of the 7 bit ASCII characters denoted by codes 0 to 127 in [1]. In the current approach a set of 256 ASCII characters called 8-bit extended ASCII set denoted by codes 0 to 255 are used by implementing interweaving and iteration. At each step of the iteration, interweaving is performed because of which the text undergoes many transformations before it becomes cipher text. In order to diagnose different diseases, the hospital has to share the patient information to the researchers. During such a transmission the data may be modified or hacked by the third party. As medical data is highly sensitive information it has to be encrypted to be secure. Medical records help patients to acquire appropriate and right treatment. If the medical records are modified the patients may receive false treatment and leads to wrong consequences. Since there is also a chance of leakage of medical records from a trusted agent also, so to prevent this, a concept called "adding fake objects" [8] is used which appear as realistic objects and thus helps in identifying the third party who leaked the data. If data is found in other sources like website by using the "agent guilty model" we may find the guilty agent who is responsible for leaking the sensitive data. In this work, we implement these concepts to provide security to medical records.
密码学在为敏感数据和信息(如医疗数据)提供安全性方面起着至关重要的作用。当需要将敏感数据从源传输到目标时,处理敏感数据的一种方法是对其进行加密。传统上,使用Hill Cipher对数据进行加密。它只用了26个英文字母。因此,它很容易受到任何已知的纯文本攻击。Hill Cipher通过使用[1]中由代码0到127表示的一组7位ASCII字符来修改。在目前的方法中,通过实现交织和迭代,使用一组256个ASCII字符,称为8位扩展ASCII集,由代码0到255表示。在迭代的每一步都要执行交织,因此文本在成为密文之前要经历许多转换。为了诊断不同的疾病,医院必须与研究人员共享患者信息。在这种传输过程中,数据可能被第三方修改或黑客攻击。由于医疗数据是高度敏感的信息,因此必须对其进行加密以确保安全。医疗记录有助于患者获得适当和正确的治疗。如果对病历进行修改,患者可能会得到错误的治疗,导致错误的后果。由于受信任的代理也有可能泄露医疗记录,因此为了防止这种情况,使用了一种称为“添加假对象”的概念[8],它看起来像真实的对象,从而有助于识别泄露数据的第三方。如果使用“代理犯罪模型”在网站等其他来源找到数据,我们可能会找到负责泄露敏感数据的犯罪代理。在这项工作中,我们实现了这些概念,以提供医疗记录的安全性。
{"title":"Secure Data Transmission Using MS- Extended 8-bit ASCII Character Set","authors":"B. Sruthi, V. Radhakrishna","doi":"10.1145/2832987.2833073","DOIUrl":"https://doi.org/10.1145/2832987.2833073","url":null,"abstract":"Cryptography plays a crucial role in providing security to the sensitive data and information such as medical data. One method to handle sensitive data when it needs to be transmitted from source to the destination is to encrypt the same. Traditionally, Hill Cipher is used to encrypt the data. which uses only 26 characters in English alphabet. So, it is vulnerable to any known plain text attack. Hill Cipher is modified by making use of a set of the 7 bit ASCII characters denoted by codes 0 to 127 in [1]. In the current approach a set of 256 ASCII characters called 8-bit extended ASCII set denoted by codes 0 to 255 are used by implementing interweaving and iteration. At each step of the iteration, interweaving is performed because of which the text undergoes many transformations before it becomes cipher text. In order to diagnose different diseases, the hospital has to share the patient information to the researchers. During such a transmission the data may be modified or hacked by the third party. As medical data is highly sensitive information it has to be encrypted to be secure. Medical records help patients to acquire appropriate and right treatment. If the medical records are modified the patients may receive false treatment and leads to wrong consequences. Since there is also a chance of leakage of medical records from a trusted agent also, so to prevent this, a concept called \"adding fake objects\" [8] is used which appear as realistic objects and thus helps in identifying the third party who leaked the data. If data is found in other sources like website by using the \"agent guilty model\" we may find the guilty agent who is responsible for leaking the sensitive data. In this work, we implement these concepts to provide security to medical records.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Acceptance of E-learning Recommender System for Saudi Universities: Framework and Hypotheses 沙特大学对电子学习推荐系统的接受:框架与假设
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833066
H. Alharbi, K. Sandhu, Trevor C. Brown
In this paper, a framework is presented to explore the factors of the e-learning recommender system acceptance for Saudi universities. This will assist to investigate the students/instructors experience according to the e-learning service quality. Such framework that is based on the Technology Acceptance Model (TAM), describes the factors of online learning acceptance should be considered in the e-learning recommender system because it is viewed as a determinant of student/instructor/university satisfaction.
本文提出了一个框架来探讨沙特大学接受电子学习推荐系统的因素。这将有助于根据在线学习服务质量调查学生/教师的体验。这种基于技术接受模型(TAM)的框架描述了在电子学习推荐系统中应该考虑的在线学习接受因素,因为它被视为学生/教师/大学满意度的决定因素。
{"title":"The Acceptance of E-learning Recommender System for Saudi Universities: Framework and Hypotheses","authors":"H. Alharbi, K. Sandhu, Trevor C. Brown","doi":"10.1145/2832987.2833066","DOIUrl":"https://doi.org/10.1145/2832987.2833066","url":null,"abstract":"In this paper, a framework is presented to explore the factors of the e-learning recommender system acceptance for Saudi universities. This will assist to investigate the students/instructors experience according to the e-learning service quality. Such framework that is based on the Technology Acceptance Model (TAM), describes the factors of online learning acceptance should be considered in the e-learning recommender system because it is viewed as a determinant of student/instructor/university satisfaction.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128071973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Evaluation of MIS Implementation Success Factors 管理信息系统实施成功因素的评价
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833003
Bassam Al-Shargabi, Omar Sabri
Management Information Systems (MIS) does not only include information systems, rather than a look to the entire business processes and resources that are directed toward pulling information from functional or tactical systems. Many challenges are facing organization when implementing and managing MIS system and projects. This paper aimed to explore those challenges and provide a model in order to tackle these challenges and lead to a successful implementation MIS system organization.
管理信息系统(MIS)不仅包括信息系统,而且还着眼于从功能或战术系统中提取信息的整个业务流程和资源。组织在实施和管理MIS系统和项目时面临着许多挑战。本文旨在探讨这些挑战,并提供一个模型,以解决这些挑战,并导致一个成功的实施MIS系统的组织。
{"title":"An Evaluation of MIS Implementation Success Factors","authors":"Bassam Al-Shargabi, Omar Sabri","doi":"10.1145/2832987.2833003","DOIUrl":"https://doi.org/10.1145/2832987.2833003","url":null,"abstract":"Management Information Systems (MIS) does not only include information systems, rather than a look to the entire business processes and resources that are directed toward pulling information from functional or tactical systems. Many challenges are facing organization when implementing and managing MIS system and projects. This paper aimed to explore those challenges and provide a model in order to tackle these challenges and lead to a successful implementation MIS system organization.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the The International Conference on Engineering & MIS 2015
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1