首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling 基于自适应反向传播神经网络和多级优先级队列调度的云资源优化利用
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.19
Anwar Saeed, Muhammad Yousif, A. Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram
With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing for optimum utilization of resources. To overcome this issue, many techniques have been proposed shill no comprehensive results have been achieved. Cloud Computing offers elastic and scalable resource sharing services by using resource management. In this article, a hybrid approach has been proposed with an objective to achieve the maximum resource utilization. In this proposed method, adaptive back propagation neural network and multi-level priority-based scheduling are being carried out for optimum resource utilization. This hybrid technique will improve the utilization of resources in cloud computing. This shows result in simulation-based on the form of MSE and Regression with job dataset, on behalf of the comparison of three algorithms like Scaled Conjugate Gradient (SCG), Levenberg Marquardt (LM) and Bayesian Regularization (BR). BR gives a better result with 60 hidden layers Neurons to other algorithms. BR gives 2.05 MSE and 95.8 regressions in Validation, LM gives 2.91 MSE and 94.06 regressions with this and SCG gives 3.92 MSE and 91.85 regressions.
随着云计算产业的不断创新,基于不同的部署标准提供了大量的服务。如今,每个人都试图保持联系,并要求以最少的时间和精力最大限度地利用资源。因此,优化资源利用是云计算中的一个重要挑战。为了克服这一问题,人们提出了许多技术,但尚未取得全面的成果。云计算通过使用资源管理提供弹性和可扩展的资源共享服务。本文提出了一种以实现资源最大化利用为目标的混合方法。该方法采用自适应反向传播神经网络和基于多级优先级的调度,实现资源的最优利用。这种混合技术将提高云计算中的资源利用率。这显示了基于MSE和作业数据集回归形式的模拟结果,代表了缩放共轭梯度(SCG), Levenberg Marquardt (LM)和贝叶斯正则化(BR)这三种算法的比较。与其他算法相比,BR在60个隐藏层神经元上得到了更好的结果。在验证中,BR给出2.05 MSE和95.8回归,LM给出2.91 MSE和94.06回归,SCG给出3.92 MSE和91.85回归。
{"title":"An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling","authors":"Anwar Saeed, Muhammad Yousif, A. Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram","doi":"10.22042/ISECURE.2019.11.0.19","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.19","url":null,"abstract":"With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing for optimum utilization of resources. To overcome this issue, many techniques have been proposed shill no comprehensive results have been achieved. Cloud Computing offers elastic and scalable resource sharing services by using resource management. In this article, a hybrid approach has been proposed with an objective to achieve the maximum resource utilization. In this proposed method, adaptive back propagation neural network and multi-level priority-based scheduling are being carried out for optimum resource utilization. This hybrid technique will improve the utilization of resources in cloud computing. This shows result in simulation-based on the form of MSE and Regression with job dataset, on behalf of the comparison of three algorithms like Scaled Conjugate Gradient (SCG), Levenberg Marquardt (LM) and Bayesian Regularization (BR). BR gives a better result with 60 hidden layers Neurons to other algorithms. BR gives 2.05 MSE and 95.8 regressions in Validation, LM gives 2.91 MSE and 94.06 regressions with this and SCG gives 3.92 MSE and 91.85 regressions.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125785350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies 使用机器学习ARIMA来预测加密货币的价格
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.18
S. A. Alahmari
The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using various machine-learning models to predict crypto currency prices. This study presented in this paper applied a classic Autoregressive Integrated Moving Average(ARIMA) model to predict the prices of the three major cryptocurrencies âAT Bitcoin, XRP and Ethereum âAT using daily, weekly and monthly time series. The results demonstrated that ARIMA outperforms most other methods in predicting cryptocurrency prices on a daily time series basis in terms of mean absolute error (MAE), mean squared error (MSE) and root mean squared error(RMSE).
数字货币的价格波动越来越大,利润潜力越来越大,这使得预测加密货币的价格成为一个非常有吸引力的研究课题。已经有几项研究使用各种机器学习模型来预测加密货币的价格。本文提出的这项研究应用经典的自回归综合移动平均线(ARIMA)模型,使用每日、每周和每月的时间序列来预测三种主要加密货币比特币、瑞波币和以太坊的价格。结果表明,在平均绝对误差(MAE)、均方误差(MSE)和均方根误差(RMSE)方面,ARIMA在每日时间序列预测加密货币价格方面优于大多数其他方法。
{"title":"Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies","authors":"S. A. Alahmari","doi":"10.22042/ISECURE.2019.11.0.18","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.18","url":null,"abstract":"The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using various machine-learning models to predict crypto currency prices. This study presented in this paper applied a classic Autoregressive Integrated Moving Average(ARIMA) model to predict the prices of the three major cryptocurrencies âAT Bitcoin, XRP and Ethereum âAT using daily, weekly and monthly time series. The results demonstrated that ARIMA outperforms most other methods in predicting cryptocurrency prices on a daily time series basis in terms of mean absolute error (MAE), mean squared error (MSE) and root mean squared error(RMSE).","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133372111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
IoT Protocols Based Fog/Cloud over High Traffic 基于物联网协议的高流量雾/云
Pub Date : 2019-08-01 DOI: 10.22042/isecure.2019.11.3.23
Istabraq M. Al-Joboury, E. Al-Hemiary
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback that will lead to high delay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like response time, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog servers with large volume of data from emulated traffic generator working alongside one real sensor . We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and Cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
物联网(IoT)成为全球数据领域的未来,嵌入式设备通过互联网相互通信,交换数据并做出决策。物联网可以改善智慧城市的生活质量,但来自不同智能设备的大量数据可能会减慢或使数据库系统崩溃。此外,物联网数据传输到云端监控信息并产生反馈,这将导致基础设施层面的高延迟。雾计算可以通过提供更接近边缘设备的服务来提供帮助。在本文中,我们提出了一种有效的系统架构来缓解延迟问题。我们为基于云或雾服务器的MQTT(消息队列遥测传输)和HTTP(超文本传输协议)协议提供响应时间、吞吐量和数据包丢失等性能分析,这些服务器具有来自模拟流量生成器的大量数据,并与一个真实传感器一起工作。我们在相同的架构中实现这两个协议,将低成本的嵌入式设备用于不同平台的本地和云服务器。结果表明,HTTP响应时间分别比位于传感器同一地理区域的基于Fog和基于Cloud的MQTT高12.1倍和4.76倍。当云是公共的并且不在国家区域中时,会出现性能最差的情况。吞吐量的结果表明,MQTT能够以可用带宽和最低的丢包率传输数据。我们还证明了所提出的雾架构是一种在基于云的物联网中减少延迟和提高性能的有效方法。
{"title":"IoT Protocols Based Fog/Cloud over High Traffic","authors":"Istabraq M. Al-Joboury, E. Al-Hemiary","doi":"10.22042/isecure.2019.11.3.23","DOIUrl":"https://doi.org/10.22042/isecure.2019.11.3.23","url":null,"abstract":"The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback that will lead to high delay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like response time, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog servers with large volume of data from emulated traffic generator working alongside one real sensor . We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and Cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114315762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cognitive Strategic Model applied to a Port System 认知策略模型在港口系统中的应用
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.10
F. Córdova, C. Durán, F. Palominos
Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge using the intangible assets of the organization. The Balanced ScoreCard, as a performance tool, has incorporated intangible assets such as intellectual, structural and social capital into management. In this way, the port community can count on new forms of managing innovation, strengthening organizational practices, and increasing collaborative work teams. In this study, the concepts from analysis of the cognitive SWOT are applied to diagnose the port activity and its community. In workshops with experts and from the vision, mission, cognitive SWOT and strategies, a cognitive strategic map considering strategic objectives and indicators is designed in the customer, processes, and learning and growth axis for the port and port community. Causal relationships between objectives, associated indicators and incidence factors are established in a forward way from learning and growth axis to customer axis. Then, the incidence matrix is developed and the direct and indirect effects between factors are analyzed, which allows recommending the future course of the port and its community.
港口组织将精力集中在有形资产上,创造盈利能力和价值。然而,人们认识到,最大的可持续竞争优势是利用组织的无形资产创造知识。平衡计分卡作为一种绩效工具,将智力资本、结构资本和社会资本等无形资产纳入管理。通过这种方式,港口社区可以依靠新形式的管理创新、加强组织实践和增加协作工作团队。在本研究中,运用认知SWOT分析中的概念对港口活动及其社区进行诊断。在与专家的研讨会上,从愿景、使命、认知SWOT和战略出发,为港口和港口社区在客户、流程、学习和成长轴上设计了考虑战略目标和指标的认知战略地图。目标、相关指标和关联因素之间的因果关系,从学习和成长轴向客户轴向前发展。然后,建立关联矩阵,分析各因素之间的直接和间接影响,为港口及其社区的未来发展提供建议。
{"title":"Cognitive Strategic Model applied to a Port System","authors":"F. Córdova, C. Durán, F. Palominos","doi":"10.22042/ISECURE.2019.11.0.10","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.10","url":null,"abstract":"Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge using the intangible assets of the organization. The Balanced ScoreCard, as a performance tool, has incorporated intangible assets such as intellectual, structural and social capital into management. In this way, the port community can count on new forms of managing innovation, strengthening organizational practices, and increasing collaborative work teams. In this study, the concepts from analysis of the cognitive SWOT are applied to diagnose the port activity and its community. In workshops with experts and from the vision, mission, cognitive SWOT and strategies, a cognitive strategic map considering strategic objectives and indicators is designed in the customer, processes, and learning and growth axis for the port and port community. Causal relationships between objectives, associated indicators and incidence factors are established in a forward way from learning and growth axis to customer axis. Then, the incidence matrix is developed and the direct and indirect effects between factors are analyzed, which allows recommending the future course of the port and its community.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134395725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sudy on Information Privacy Issue on Social Networks 社交网络中的信息隐私问题研究
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.3
Ibrahim Soran, Qing Tan
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data are collected about users by different organizations and companies, privacy concerns on the SNs have become more and more prominent. In this paper, we present a study on information privacy in SNs through exploring the general laws and regulations on collecting, using and disclosure of information from Canadian perspectives based on the Personal Information Protection and Electronic Document Act (PIPEDA). The main focus of this paper is to present results from a survey and the findings of the survey.
近年来,社交网络(social networks, SN)被用于沟通和网络、社交、营销以及人们的日常生活。全球数十亿人通过各种网络平台和应用连接在一起,从而产生了海量的网络数据。这包括个人数据或个人身份信息(PII)。随着越来越多的用户数据被不同的组织和公司收集,社交网络上的隐私问题变得越来越突出。本文以加拿大的《个人信息保护与电子文档法》(PIPEDA)为基础,从加拿大的角度探讨了信息收集、使用和披露的一般法律法规,对SNs中的信息隐私进行了研究。本文的主要重点是介绍调查结果和调查结果。
{"title":"A Sudy on Information Privacy Issue on Social Networks","authors":"Ibrahim Soran, Qing Tan","doi":"10.22042/ISECURE.2019.11.0.3","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.3","url":null,"abstract":"In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data are collected about users by different organizations and companies, privacy concerns on the SNs have become more and more prominent. In this paper, we present a study on information privacy in SNs through exploring the general laws and regulations on collecting, using and disclosure of information from Canadian perspectives based on the Personal Information Protection and Electronic Document Act (PIPEDA). The main focus of this paper is to present results from a survey and the findings of the survey.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining 通过数据预处理增强对不平衡类的学习:数据驱动在代谢组学数据挖掘中的应用
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.11
Ahmed Banimustafa
This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve this goal, a data-driven analysis is carried out using a public dataset consisting of 1H-NMR metabolite profile. This dataset suffers from the problem of imbalanced classes which is known to deteriorate the performance of classifiers. It also influences its validity and generalizablity. The classification models in this study were built using five machine learning algorithms known as PLS-DA, MLP, SVM, C4.5 and ID3. This model is built after carrying out a number of intensive data preprocessing procedures to tackle the problem of imbalanced classes and improve the performance of the constructed classifiers.These procedures involves applying data transformation, normalization, standardization, re-sampling and data reduction procedures using a number of variables importance scorers. The best performance was achieved by building an MLP model that was trained and tested using five-fold cross-validation using datasets that were re-sampled using SMOTE method and then reduced using SVM variable importance scorer. This model was successful in classifying samples with excellent accuracy and also in identifying the potential disease biomarkers. The results confirm the validity of metabolomics data mining for diagnosis of cachexia. It also emphasizes the importance of data preprocessing procedures such as sampling and data reduction for improving data mining results, particularly when data suffers from the problem of imbalanced classes.
本文介绍了数据挖掘在代谢组学中的应用。它旨在建立一个增强的机器学习分类器,可用于诊断恶病质综合征并识别其相关的生物标志物。为了实现这一目标,使用由1H-NMR代谢物谱组成的公共数据集进行数据驱动分析。这个数据集存在不平衡类的问题,这是已知的会降低分类器性能的问题。这也影响了它的有效性和普遍性。本研究使用PLS-DA、MLP、SVM、C4.5和ID3五种机器学习算法构建分类模型。该模型是在进行大量密集的数据预处理过程后建立的,以解决类不平衡的问题,并提高构建的分类器的性能。这些程序包括应用数据转换、规范化、标准化、重新抽样和使用一些变量重要性评分器的数据缩减程序。通过建立一个MLP模型,该模型使用五倍交叉验证进行训练和测试,使用SMOTE方法重新采样数据集,然后使用SVM变量重要性评分器减少数据集,从而获得最佳性能。该模型成功地以极高的准确性对样本进行分类,并识别潜在的疾病生物标志物。结果证实了代谢组学数据挖掘诊断恶病质的有效性。它还强调了数据预处理过程(如采样和数据缩减)对于改善数据挖掘结果的重要性,特别是当数据遭受类不平衡问题时。
{"title":"Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining","authors":"Ahmed Banimustafa","doi":"10.22042/ISECURE.2019.11.0.11","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.11","url":null,"abstract":"This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve this goal, a data-driven analysis is carried out using a public dataset consisting of 1H-NMR metabolite profile. This dataset suffers from the problem of imbalanced classes which is known to deteriorate the performance of classifiers. It also influences its validity and generalizablity. The classification models in this study were built using five machine learning algorithms known as PLS-DA, MLP, SVM, C4.5 and ID3. This model is built after carrying out a number of intensive data preprocessing procedures to tackle the problem of imbalanced classes and improve the performance of the constructed classifiers.These procedures involves applying data transformation, normalization, standardization, re-sampling and data reduction procedures using a number of variables importance scorers. The best performance was achieved by building an MLP model that was trained and tested using five-fold cross-validation using datasets that were re-sampled using SMOTE method and then reduced using SVM variable importance scorer. This model was successful in classifying samples with excellent accuracy and also in identifying the potential disease biomarkers. The results confirm the validity of metabolomics data mining for diagnosis of cachexia. It also emphasizes the importance of data preprocessing procedures such as sampling and data reduction for improving data mining results, particularly when data suffers from the problem of imbalanced classes.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Aspect Oriented UML to ECORE Model Transformation 面向方面的UML到ECORE模型的转换
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.13
M. Memon, Z. Hassan, K. Dahri, Asadullah Shaikh, M. A. Nizamani
With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models with the help of dynamic hash tables. Hash tables store reference links between the elements of the source and target model. Whenever there is a need to access the target element, we query the hash table. In contrast, this paper presents an approach by directly creating aspects in the source meta-model with traces. These traces hold references to target elements during the execution. Illustrating the idea of model driven engineering (MDE), This paper proposes a method that transforms UML class models to EMF ECORE model.
随着模型转换概念的出现,可以从一个或多个源模型中提取信息以生成目标模型。这些模型的转换可以用特定的转换语言自动完成。这种转换需要在动态哈希表的帮助下在两个模型之间进行映射。散列表存储源模型和目标模型元素之间的引用链接。每当需要访问目标元素时,我们就查询哈希表。相反,本文提出了一种直接在源元模型中创建带有跟踪的方面的方法。这些跟踪保存了执行期间对目标元素的引用。阐述了模型驱动工程(MDE)的思想,提出了一种将UML类模型转换为EMF ECORE模型的方法。
{"title":"Aspect Oriented UML to ECORE Model Transformation","authors":"M. Memon, Z. Hassan, K. Dahri, Asadullah Shaikh, M. A. Nizamani","doi":"10.22042/ISECURE.2019.11.0.13","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.13","url":null,"abstract":"With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models with the help of dynamic hash tables. Hash tables store reference links between the elements of the source and target model. Whenever there is a need to access the target element, we query the hash table. In contrast, this paper presents an approach by directly creating aspects in the source meta-model with traces. These traces hold references to target elements during the execution. Illustrating the idea of model driven engineering (MDE), This paper proposes a method that transforms UML class models to EMF ECORE model.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns RFID技术在物联网中的作用和应用:通信、认证、风险和安全问题
Pub Date : 2019-07-01 DOI: 10.22042/ISECURE.2019.11.0.2
Hadjer Saadi, M. Yagoub, R. Touhami
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency identification(RFID), sensors, and mobile telephony, to name a few. This article aims to talk specifically about the RFID technology and its accompanying communication, authentication, risk, and security concerns while applied to the IoT field. An important part of this work is indeed focused on security aspects that derive from the use of RFID in IoT, especially in IoT networks. The results of our research work highlighted an excellent integration of RFID in the field of Internet of things, particularly in healthcare systems.
物联网(IoT)是一个非常令人鼓舞和快速增长的领域,它汇集了无线系统,传感器网络,执行器等的优势。广泛的物联网应用已经成为目标,并且已经确定了该领域的几个方面,以解决具体问题,以及在射频识别(RFID),传感器和移动电话等各个领域开发的技术和标准。本文旨在具体讨论RFID技术及其在应用于物联网领域时的通信、认证、风险和安全问题。这项工作的一个重要部分确实侧重于在物联网,特别是物联网网络中使用RFID所产生的安全方面。我们的研究成果突出了RFID在物联网领域,特别是在医疗保健系统中的出色集成。
{"title":"Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns","authors":"Hadjer Saadi, M. Yagoub, R. Touhami","doi":"10.22042/ISECURE.2019.11.0.2","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.2","url":null,"abstract":"The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency identification(RFID), sensors, and mobile telephony, to name a few. This article aims to talk specifically about the RFID technology and its accompanying communication, authentication, risk, and security concerns while applied to the IoT field. An important part of this work is indeed focused on security aspects that derive from the use of RFID in IoT, especially in IoT networks. The results of our research work highlighted an excellent integration of RFID in the field of Internet of things, particularly in healthcare systems.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Medical Image Compression Based on Region of Interest 基于感兴趣区域的医学图像压缩
Pub Date : 2019-07-01 DOI: 10.22042/ISECURE.2019.11.0.4
Dalia Shaaban, M. Saad, A. Madian, H. Elmahdy
Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and hybrid lossless compression techniques are applied on medical images to be compressed without losing important data. In this paper, a proposed model will be presented and assessed based on size of the image, the Peak Signal to Noise Ratio (PSNR),and the time that is required to compress and reconstruct the original image.The major objective of the proposed model is to minimize the size of image and the transmission time. Moreover, improving the PSNR is a critical challenge.The results of the proposed model illustrate that applying hybrid losslesstechniques on the ROI of medical images reduces size by 39% and gives better results in terms of the compression ratio and PSNR.
医学图像显示出极大的兴趣,因为它需要在各种医学应用。为了减小传输速度较快的医学图像的尺寸;将感兴趣区域(ROI)和混合无损压缩技术应用于医学图像的压缩,在不丢失重要数据的情况下进行压缩。本文将根据图像的大小、峰值信噪比(PSNR)以及压缩和重建原始图像所需的时间,提出并评估一个拟议的模型。该模型的主要目标是最小化图像尺寸和传输时间。此外,提高PSNR是一个关键的挑战。实验结果表明,采用混合无损技术对医学图像进行ROI处理后,图像尺寸减小39%,压缩比和PSNR均有较好的改善。
{"title":"Medical Image Compression Based on Region of Interest","authors":"Dalia Shaaban, M. Saad, A. Madian, H. Elmahdy","doi":"10.22042/ISECURE.2019.11.0.4","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.4","url":null,"abstract":"Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and hybrid lossless compression techniques are applied on medical images to be compressed without losing important data. In this paper, a proposed model will be presented and assessed based on size of the image, the Peak Signal to Noise Ratio (PSNR),and the time that is required to compress and reconstruct the original image.The major objective of the proposed model is to minimize the size of image and the transmission time. Moreover, improving the PSNR is a critical challenge.The results of the proposed model illustrate that applying hybrid losslesstechniques on the ROI of medical images reduces size by 39% and gives better results in terms of the compression ratio and PSNR.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algebraic Matching of Vulnerabilities in a Low-Level Code 低级代码中漏洞的代数匹配
Pub Date : 2019-07-01 DOI: 10.22042/ISECURE.2019.11.0.1
O. Letychevskyi, Y. Hryniuk, V. Yakovlev, V. Peschanenko, V. Radchenko
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques with usage of conditional rewriting. This process is combined with symbolic modeling that gives a possibility to provide accurate detection of vulnerabilities. The paper provides examples of formalization of vulnerability models and translation of binary codes to behavior algebra expressions.
本文探讨了一种用于二进制代码漏洞检测的代数匹配方法。采用代数规划系统实现该方法。预计需要验证的漏洞和程序模型将以行为代数和动作语言规范的形式呈现。代数匹配的方法基于改写规则和条件改写技术。此过程与符号建模相结合,可以提供对漏洞的准确检测。本文提供了漏洞模型的形式化和将二进制代码转换为行为代数表达式的例子。
{"title":"Algebraic Matching of Vulnerabilities in a Low-Level Code","authors":"O. Letychevskyi, Y. Hryniuk, V. Yakovlev, V. Peschanenko, V. Radchenko","doi":"10.22042/ISECURE.2019.11.0.1","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.1","url":null,"abstract":"This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques with usage of conditional rewriting. This process is combined with symbolic modeling that gives a possibility to provide accurate detection of vulnerabilities. The paper provides examples of formalization of vulnerability models and translation of binary codes to behavior algebra expressions.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1