首页 > 最新文献

2013 International Conference on IT Convergence and Security (ICITCS)最新文献

英文 中文
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context 一种基于copula的欺诈检测(CFD)方法在企业移动银行环境下检测规避欺诈模式
Pub Date : 2013-12-18 DOI: 10.1109/ICITCS.2013.6717772
Abdullah A. I. Alnajem, Ning Zhang
This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such evasive fraud patterns effectively. Using corporate m-banking (m-banking) as an application context, this paper proposes a novel fraud detection method, the CFD method, to address this open issue. The CFD method measures an aggregated fraud risk value for a given corporate m-banking transaction. Different from existing methods, which typically assume that the different marginal fraud risk factors are independent of each other, the CFD method can capture evasive fraud patterns caused by fraud risk factors that are inter-dependent or independent of each other. Evaluation results using Monte Carlo simulations showed that the CFD method is more effective in detecting evasive fraud patterns than the independence-based aggregation method.
本文研究了一些特殊的欺诈模式,称为规避欺诈模式(这是规避欺诈行为的类型),由一组边际欺诈风险因素(即个人欺诈风险因素)引起,这些因素以负相关的形式相互依赖。这些相互依赖关系,如果不能正确捕获,可能会阻止银行的欺诈检测系统有效地检测到这种逃避欺诈模式。本文以企业移动银行(m-banking)为应用背景,提出了一种新的欺诈检测方法——CFD方法来解决这一开放性问题。CFD方法测量给定公司移动银行交易的汇总欺诈风险值。与现有方法通常假设不同的边际欺诈风险因素相互独立不同,CFD方法可以捕获由相互依赖或相互独立的欺诈风险因素引起的规避欺诈模式。蒙特卡罗仿真结果表明,CFD方法比基于独立性的聚合方法更有效地检测出规避欺诈模式。
{"title":"A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context","authors":"Abdullah A. I. Alnajem, Ning Zhang","doi":"10.1109/ICITCS.2013.6717772","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717772","url":null,"abstract":"This paper examines some special fraud patterns called evasive fraud patterns (which are types of evasive fraudulent behaviours) caused by a set of marginal fraud risk factors (i.e. individual fraud risk factors) which have inter-dependencies in the form of negative correlations. These inter-dependencies, if not captured properly, may prevent a bank's fraud detection system from detecting such evasive fraud patterns effectively. Using corporate m-banking (m-banking) as an application context, this paper proposes a novel fraud detection method, the CFD method, to address this open issue. The CFD method measures an aggregated fraud risk value for a given corporate m-banking transaction. Different from existing methods, which typically assume that the different marginal fraud risk factors are independent of each other, the CFD method can capture evasive fraud patterns caused by fraud risk factors that are inter-dependent or independent of each other. Evaluation results using Monte Carlo simulations showed that the CFD method is more effective in detecting evasive fraud patterns than the independence-based aggregation method.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market 移动核心银行服务器:面向大众市场的无现金、无分支和无线零售银行
Pub Date : 2013-12-16 DOI: 10.1109/ICITCS.2013.6717857
Insu Song, J. Vong
Banking is essential to modern economies and nearly half of the world's people are unbanked and underserved by banks. The high operating costs of banks passed on to retail customers are driving them away who otherwise should be in the financial system. Without having access to the financial system the unbanked and rural poor have little means to engage in mainstream economic activities. A mobile phone-based banking system was designed to provide retail banking services to the world's unbanked population and rural poor of 2.2 billion based on a cashless banking system that reduces operating cost and reduces lending risks and therefore can lower the current exorbitant rates charged on retail lending and micro-credit. A core-banking server on a low-cost mobile device (an Android tablet) could serve over 15,000 micro-banking customers. The system definitely appears to be suitable for most retail banks or microfinance institutions.
银行业对现代经济至关重要,世界上近一半的人没有银行账户,得不到银行的充分服务。银行转嫁给零售客户的高运营成本,正把原本应该留在金融体系的零售客户赶走。没有银行账户和农村贫困人口无法进入金融体系,几乎没有办法参与主流经济活动。基于移动电话的银行系统旨在为世界上没有银行账户的人口和22亿农村贫困人口提供零售银行服务,该系统基于无现金银行系统,可降低运营成本和贷款风险,从而降低目前对零售贷款和小额信贷收取的过高利率。低成本移动设备(Android平板电脑)上的核心银行服务器可以为超过15,000个小额银行客户提供服务。该系统显然适合大多数零售银行或小额信贷机构。
{"title":"Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market","authors":"Insu Song, J. Vong","doi":"10.1109/ICITCS.2013.6717857","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717857","url":null,"abstract":"Banking is essential to modern economies and nearly half of the world's people are unbanked and underserved by banks. The high operating costs of banks passed on to retail customers are driving them away who otherwise should be in the financial system. Without having access to the financial system the unbanked and rural poor have little means to engage in mainstream economic activities. A mobile phone-based banking system was designed to provide retail banking services to the world's unbanked population and rural poor of 2.2 billion based on a cashless banking system that reduces operating cost and reduces lending risks and therefore can lower the current exorbitant rates charged on retail lending and micro-credit. A core-banking server on a low-cost mobile device (an Android tablet) could serve over 15,000 micro-banking customers. The system definitely appears to be suitable for most retail banks or microfinance institutions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response 考虑实时响应的Dalvik虚拟机堆垃圾回收性能研究
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717889
Hyun-Joo Yoo, S. Kim, Min-soo Jung
Global smartphone OS market share, accounting for more than 70 percent, based on the Linux kernel that Android native region and is a software stack consists of Java area. Android basic application architecture of a Java virtual machine via the system is processing to real-time process. Most of the Android application's configuration requires a bitmap handle, and also the network and the various sensors and consists of various processes, such as DB, and these features must be processed in real-time. Thus, at the heart of this real-time processing performance of Dalvik VM Heap Garbage Collection Techniques for managing the performance improvement is very important. In this paper, based on Android OS version changes with changes in memory management policies for applications with enhanced performance analysis technique Garbage Collection and propose research directions.
全球智能手机操作系统市场份额中,占比超过70%,基于Linux内核即Android原生区域,是一个由Java软件栈组成的区域。Android应用程序的基本架构是通过一个Java虚拟机系统来处理实时进程。大多数Android应用程序的配置需要位图句柄,还需要网络和各种传感器,并由各种进程组成,例如DB,这些特征必须实时处理。因此,在这个实时处理性能的核心Dalvik中,VM堆垃圾收集技术对于管理性能的提高是非常重要的。本文基于Android操作系统版本变化随着内存管理策略的变化,对应用程序进行增强性能的垃圾回收分析技术,并提出研究方向。
{"title":"Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response","authors":"Hyun-Joo Yoo, S. Kim, Min-soo Jung","doi":"10.1109/ICITCS.2013.6717889","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717889","url":null,"abstract":"Global smartphone OS market share, accounting for more than 70 percent, based on the Linux kernel that Android native region and is a software stack consists of Java area. Android basic application architecture of a Java virtual machine via the system is processing to real-time process. Most of the Android application's configuration requires a bitmap handle, and also the network and the various sensors and consists of various processes, such as DB, and these features must be processed in real-time. Thus, at the heart of this real-time processing performance of Dalvik VM Heap Garbage Collection Techniques for managing the performance improvement is very important. In this paper, based on Android OS version changes with changes in memory management policies for applications with enhanced performance analysis technique Garbage Collection and propose research directions.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Panhinda - Offline Character Recognition System for Handwritten Articles Panhinda -手写文章的离线字符识别系统
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717866
D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne
This paper presents an innovative technique to recognize Handwritten Articles. Proposed system is called "Panhinda". The target user group for this application would be the people who are involved with a lot of paper work on a daily basis. The proposed Character Recognition system was implemented with the capability of extracting the content of an image where the mentioned content is a hand written set of words or characters. The conversion process runs as a background process without any involvement of the user. Once the conversion is completed, User gets the capability of editing the converted text as he prefers with the aid of the Panhinda editor. This document describes the techniques for enhancing the quality of the image, character segmentation, character recognition and digital dictionaries. Noise removal, angle effects and lighting conditions are done at the pre-processing phase. After getting a quality binarized image, character segmentation will be done using Horizontal and Vertical Projection Profile method. The Support Vector Machine technique will be used to recognize the characters. Digital Dictionary will be used to capture the conflicts of the output. Error correction will be done by using a combined model of noisy channel model and natural language model. By walking through above mentioned processes handwritten article image will be converted into an editable text file. Experimenting with a set of 200 sample images, scanned through the Scanner, we have achieved a maximum recognition accuracy of 99.5% with manual error correction. Compared to existing commercial OCR systems, present recognition accuracy is worth contributing. Moreover, the developed technique is computationally efficient and consumes low memory.
本文提出了一种新颖的手写体文章识别技术。提议的系统被称为“Panhinda”。这个应用程序的目标用户群是那些每天都要处理大量文书工作的人。所提出的字符识别系统具有提取图像内容的能力,其中提到的内容是一组手写的单词或字符。转换过程作为后台进程运行,无需用户参与。一旦转换完成,用户就可以在Panhinda编辑器的帮助下编辑转换后的文本。本文介绍了提高图像质量、字符分割、字符识别和数字字典的技术。噪声去除,角度效果和照明条件在预处理阶段完成。在得到高质量的二值化图像后,使用水平和垂直投影轮廓法进行字符分割。将使用支持向量机技术来识别字符。将使用Digital Dictionary来捕获输出的冲突。采用噪声信道模型和自然语言模型相结合的方法进行误差校正。通过上述过程,手写文章图像将转换为可编辑的文本文件。对一组200个样本图像进行实验,通过扫描仪扫描,我们在手动纠错的情况下达到了99.5%的最高识别精度。与现有商用OCR系统相比,现有OCR系统的识别精度值得提高。此外,所开发的技术具有计算效率高、占用内存少的特点。
{"title":"Panhinda - Offline Character Recognition System for Handwritten Articles","authors":"D. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne","doi":"10.1109/ICITCS.2013.6717866","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717866","url":null,"abstract":"This paper presents an innovative technique to recognize Handwritten Articles. Proposed system is called \"Panhinda\". The target user group for this application would be the people who are involved with a lot of paper work on a daily basis. The proposed Character Recognition system was implemented with the capability of extracting the content of an image where the mentioned content is a hand written set of words or characters. The conversion process runs as a background process without any involvement of the user. Once the conversion is completed, User gets the capability of editing the converted text as he prefers with the aid of the Panhinda editor. This document describes the techniques for enhancing the quality of the image, character segmentation, character recognition and digital dictionaries. Noise removal, angle effects and lighting conditions are done at the pre-processing phase. After getting a quality binarized image, character segmentation will be done using Horizontal and Vertical Projection Profile method. The Support Vector Machine technique will be used to recognize the characters. Digital Dictionary will be used to capture the conflicts of the output. Error correction will be done by using a combined model of noisy channel model and natural language model. By walking through above mentioned processes handwritten article image will be converted into an editable text file. Experimenting with a set of 200 sample images, scanned through the Scanner, we have achieved a maximum recognition accuracy of 99.5% with manual error correction. Compared to existing commercial OCR systems, present recognition accuracy is worth contributing. Moreover, the developed technique is computationally efficient and consumes low memory.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116627779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Key Distribution Protocol on Quantum Cryptography 量子密码学中的密钥分发协议
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717850
Kondwani Makanda, J. Jeon
In this paper, we discuss some problems in modern key distribution cryptography such as Diffie-Hellman key distribution and compare with quantum key distribution cryptography which has potential of replacing the typical algorithms due to the fact that they use natural properties of physics like not being able to be cloned or copied.
本文讨论了Diffie-Hellman密钥分发等现代密钥分发密码学中的一些问题,并与量子密钥分发密码学进行了比较。量子密钥分发密码学利用了物理的不可克隆性等自然特性,有可能取代传统的密码学算法。
{"title":"Key Distribution Protocol on Quantum Cryptography","authors":"Kondwani Makanda, J. Jeon","doi":"10.1109/ICITCS.2013.6717850","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717850","url":null,"abstract":"In this paper, we discuss some problems in modern key distribution cryptography such as Diffie-Hellman key distribution and compare with quantum key distribution cryptography which has potential of replacing the typical algorithms due to the fact that they use natural properties of physics like not being able to be cloned or copied.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Secret Signature Scheme with No Randomness Saving 无随机保存的实用秘密签名方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717872
Byoungcheon Lee
Secret signatures, proposed by Lee textit{et al.} cite{LCYY07,LLK09}, provide signature privacy and public provability at the same time. Using these schemes a signer can send his signature secretly to a designated receiver such that only the designated receiver can verify the signature. Moreover, if any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. But in these schemes one of the drawback is that the signer has to keep the random number used in the signing algorithm for later use, i.e., to provide public provability. This is very impractical in the real world, since random numbers used in many cryptographic algorithms are generally used only once and they have to be removed safely for security reason. In this paper we amend Lee textit{et al.}'s secret signature scheme such that random number is replaced by a pseudo random number that can be computed only by the signer as a function of signer's private key and timestamp. With this change signer can compute the pseudo random number at any later time that he doesn't need to save it anymore, and it can be computed only by the signer. With this change we think that secret signature scheme becomes more practical and can be used as an important cryptographic primitive to achieve signature privacy in the real world.
Leetextit{等人}cite{LCYY07,LLK09}提出的秘密签名同时提供签名隐私性和公共可证明性。使用这些方案,签名者可以将他的签名秘密地发送给指定的接收者,这样只有指定的接收者可以验证签名。此外,如果它们之间发生任何争论,则可以由签名者或接收者公开证明秘密签名的有效性。但在这些方案中,缺点之一是签名者必须保留签名算法中使用的随机数以供以后使用,即提供公共可证明性。这在现实世界中是非常不切实际的,因为许多加密算法中使用的随机数通常只使用一次,并且出于安全原因必须安全地删除它们。本文修改了Leetextit{等人}的秘密签名方案,将随机数替换为一个伪随机数,该伪随机数只能由签名者作为签名者私钥和时间戳的函数来计算。通过此更改,签名者可以在以后的任何时候计算伪随机数,他不再需要保存它,并且它只能由签名者计算。通过这一变化,我们认为秘密签名方案变得更加实用,可以作为现实世界中实现签名隐私的重要密码原语。
{"title":"Practical Secret Signature Scheme with No Randomness Saving","authors":"Byoungcheon Lee","doi":"10.1109/ICITCS.2013.6717872","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717872","url":null,"abstract":"Secret signatures, proposed by Lee textit{et al.} cite{LCYY07,LLK09}, provide signature privacy and public provability at the same time. Using these schemes a signer can send his signature secretly to a designated receiver such that only the designated receiver can verify the signature. Moreover, if any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. But in these schemes one of the drawback is that the signer has to keep the random number used in the signing algorithm for later use, i.e., to provide public provability. This is very impractical in the real world, since random numbers used in many cryptographic algorithms are generally used only once and they have to be removed safely for security reason. In this paper we amend Lee textit{et al.}'s secret signature scheme such that random number is replaced by a pseudo random number that can be computed only by the signer as a function of signer's private key and timestamp. With this change signer can compute the pseudo random number at any later time that he doesn't need to save it anymore, and it can be computed only by the signer. With this change we think that secret signature scheme becomes more practical and can be used as an important cryptographic primitive to achieve signature privacy in the real world.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126839550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Based Real Time Embedded Color Tracking Mobile Robot 基于FPGA的实时嵌入式颜色跟踪移动机器人
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717835
S. Bold, Min-A Jeong, S. Jeon, Seong-Ro Lee
Object tracking is an important task in CMOS camera and color tracking robot. For object tracking, a camera is often utilized to obtain information of construction vehicle motion which can then be employed in coordination controls. Therefore FPGA technology is applied to the prototypical tracking system for vehicles by using a CMOS camera to detect their color tags. We designed the proposed an architecture using VHDL and implementing the design in a Diligent Nexys2 FPGA. FPGA circuit presented in this paper can track a solid color object in a scene when it receives as input a digitized PAL/NTSC stream. Then we capture the video from a camera, process it on FPGA and then display it on a 3.2' display.
目标跟踪是CMOS相机和彩色跟踪机器人中的重要任务。对于目标跟踪,通常使用摄像机来获取施工车辆的运动信息,然后将其用于协调控制。因此,将FPGA技术应用于典型的车辆跟踪系统中,利用CMOS相机检测车辆的颜色标签。我们利用VHDL设计了所提出的架构,并在Diligent Nexys2 FPGA上实现。本文提出的FPGA电路在接收数字化PAL/NTSC流作为输入时,可以对场景中的纯色物体进行跟踪。然后我们从摄像机中捕获视频,在FPGA上进行处理,然后在3.2'显示器上显示。
{"title":"FPGA Based Real Time Embedded Color Tracking Mobile Robot","authors":"S. Bold, Min-A Jeong, S. Jeon, Seong-Ro Lee","doi":"10.1109/ICITCS.2013.6717835","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717835","url":null,"abstract":"Object tracking is an important task in CMOS camera and color tracking robot. For object tracking, a camera is often utilized to obtain information of construction vehicle motion which can then be employed in coordination controls. Therefore FPGA technology is applied to the prototypical tracking system for vehicles by using a CMOS camera to detect their color tags. We designed the proposed an architecture using VHDL and implementing the design in a Diligent Nexys2 FPGA. FPGA circuit presented in this paper can track a solid color object in a scene when it receives as input a digitized PAL/NTSC stream. Then we capture the video from a camera, process it on FPGA and then display it on a 3.2' display.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116073034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
RNA-Seq Read Simulator Using SAM Template 使用SAM模板的RNA-Seq读取模拟器
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717877
Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee
Sequencing technologies, which generate read segments from reference genes, have been diversified significantly with the introduction of the Next Generation Sequencer. Despite of its efficiency in terms of time and cost compared to the previous one, it is still too expensive to conduct a bunch of experiments consequently or to reflect particular biological specificity in the experimental settings. To deal with this problem, there have been developed some simulators that generates reads reflecting specific biological characteristics. However, there is still a lack of the consideration of some other important statistical quantities such as gene expression levels in read simulation. After giving a brief review on state-of-the-art read simulators focusing on their sequencing method and functional characteristics, this paper presents a new read simulation method considering gene expression structures. The proposed method extracts the statistical information from SAM files that contain read mapping results, and generates synthetic reads having the analyzed characteristics. We also demonstrate the effectiveness of the proposed method by comparing simulated data with the real data.
随着下一代测序仪的引入,从内参基因中产生读片段的测序技术已经大大多样化。尽管与前一种相比,它在时间和成本上都有所提高,但在实验环境中进行大量实验或反映特定的生物特异性仍然过于昂贵。为了解决这个问题,已经开发了一些模拟器来生成反映特定生物学特性的读数。然而,在读取模拟中还缺乏对基因表达水平等其他重要统计量的考虑。本文在简要介绍了当前的读取模拟器的测序方法和功能特点的基础上,提出了一种考虑基因表达结构的读取模拟器的新方法。该方法从包含读映射结果的SAM文件中提取统计信息,生成具有分析特征的综合读。通过仿真数据与实际数据的对比,验证了所提方法的有效性。
{"title":"RNA-Seq Read Simulator Using SAM Template","authors":"Sang-Min Lee, H. Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee","doi":"10.1109/ICITCS.2013.6717877","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717877","url":null,"abstract":"Sequencing technologies, which generate read segments from reference genes, have been diversified significantly with the introduction of the Next Generation Sequencer. Despite of its efficiency in terms of time and cost compared to the previous one, it is still too expensive to conduct a bunch of experiments consequently or to reflect particular biological specificity in the experimental settings. To deal with this problem, there have been developed some simulators that generates reads reflecting specific biological characteristics. However, there is still a lack of the consideration of some other important statistical quantities such as gene expression levels in read simulation. After giving a brief review on state-of-the-art read simulators focusing on their sequencing method and functional characteristics, this paper presents a new read simulation method considering gene expression structures. The proposed method extracts the statistical information from SAM files that contain read mapping results, and generates synthetic reads having the analyzed characteristics. We also demonstrate the effectiveness of the proposed method by comparing simulated data with the real data.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Lock 人脸识别锁
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717833
L. Deng, Dong-liang Lee, Yi-Jen Liu
In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.
近年来,越来越多的研究或行业产品对人体特有的生理特征或行为表达进行了识别,这些技术为需要身份验证、门禁卡或高安全性的环境提供了最佳解决方案。本文通过肤色区域分割和主成分分析(pca),将人脸图像转换成重要的特征向量作为加密文件的密钥,从而根据每个人不同的面部特征判断用户对文件的评估权限。
{"title":"Face Recognition Lock","authors":"L. Deng, Dong-liang Lee, Yi-Jen Liu","doi":"10.1109/ICITCS.2013.6717833","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717833","url":null,"abstract":"In recent years, more and more studies or industry products have conducted recognition to the physiological feature or behavioral expression which are peculiar to human body, and these techniques provide the optimum solution for the environment, which needs identity verification, access badges or high security. In this paper, by the skin color area segmentation and principal component analysis -PCA, the face images are transferred into important feature vectors as the key of encrypting the files, thus our system can judge the user's permission of assessing the files according to the different facial features of each person.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing 基于Web服务的YOHO智能信息处理云接口代理
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717797
Sheng-Yuan Yang, Dong-liang Lee, L. Deng
In this paper, a cloud interface agent with Web service techniques for intelligent YOHO information processing was presented. The agent is not only able to explore related technologies in order to establish Web service platforms, but it can also investigate the construction of cloud interactive diagrams using Web service techniques for extensively and seamlessly integrating backend YOHO information systems on the Internet. The preliminary system developments and tableaux show that the research results yield positive outcomes.
本文提出了一种基于Web服务技术的智能YOHO信息处理的云接口代理。代理不仅能够探索相关技术以建立Web服务平台,还可以研究利用Web服务技术构建云交互图,以便在Internet上广泛无缝地集成后端YOHO信息系统。初步的系统开发和场景显示,研究结果产生了积极的成果。
{"title":"A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing","authors":"Sheng-Yuan Yang, Dong-liang Lee, L. Deng","doi":"10.1109/ICITCS.2013.6717797","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717797","url":null,"abstract":"In this paper, a cloud interface agent with Web service techniques for intelligent YOHO information processing was presented. The agent is not only able to explore related technologies in order to establish Web service platforms, but it can also investigate the construction of cloud interactive diagrams using Web service techniques for extensively and seamlessly integrating backend YOHO information systems on the Internet. The preliminary system developments and tableaux show that the research results yield positive outcomes.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 International Conference on IT Convergence and Security (ICITCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1