首页 > 最新文献

Journal of Advanced Computer Science and Technology最新文献

英文 中文
A four-phase data replication algorithm for data grid 数据网格的四阶段数据复制算法
Pub Date : 2015-04-12 DOI: 10.14419/JACST.V4I1.4009
Ali Saleh, R. Javidan, Mohammad Taghi FatehiKhajeh
Nowadays, scientific applications generate a huge amount of data in terabytes or petabytes. Data grids currently proposed solutions to large scale data management problems including efficient file transfer and replication. Data is typically replicated in a Data Grid to improve the job response time and data availability. A reasonable number and right locations for replicas has become a challenge in the Data Grid. In this paper, a four-phase dynamic data replication algorithm based on Temporal and Geographical locality is proposed. It includes: 1) evaluating and identifying the popular data and triggering a replication operation when the popularity data passes a dynamic threshold; 2) analyzing and modeling the relationship between system availability and the number of replicas, and calculating a suitable number of new replicas; 3) evaluating and identifying the popular data in each site, and placing replicas among them; 4) removing files with least cost of average access time when encountering insufficient space for replication. The algorithm was tested using a grid simulator, OptorSim developed by European Data Grid Projects. The simulation results show that the proposed algorithm has better performance in comparison with other algorithms in terms of job execution time, effective network usage and percentage of storage filled.
如今,科学应用产生的大量数据以太字节或拍字节为单位。数据网格目前提出了解决大规模数据管理问题的方案,包括有效的文件传输和复制。数据通常在Data Grid中复制,以改善作业响应时间和数据可用性。合理数量和正确位置的副本已经成为数据网格中的一个挑战。提出了一种基于时间和地理局部性的四阶段动态数据复制算法。它包括:1)评估和识别流行数据,并在流行数据超过动态阈值时触发复制操作;2)对系统可用性与副本数量之间的关系进行分析和建模,并计算出合适的新副本数量;3)评估和识别每个站点的热门数据,并在其中放置副本;4)当遇到复制空间不足时,以最小的平均访问时间删除文件。该算法使用欧洲数据网格项目开发的网格模拟器OptorSim进行了测试。仿真结果表明,该算法在作业执行时间、有效网络利用率和存储空间填充率等方面均优于其他算法。
{"title":"A four-phase data replication algorithm for data grid","authors":"Ali Saleh, R. Javidan, Mohammad Taghi FatehiKhajeh","doi":"10.14419/JACST.V4I1.4009","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4009","url":null,"abstract":"Nowadays, scientific applications generate a huge amount of data in terabytes or petabytes. Data grids currently proposed solutions to large scale data management problems including efficient file transfer and replication. Data is typically replicated in a Data Grid to improve the job response time and data availability. A reasonable number and right locations for replicas has become a challenge in the Data Grid. In this paper, a four-phase dynamic data replication algorithm based on Temporal and Geographical locality is proposed. It includes: 1) evaluating and identifying the popular data and triggering a replication operation when the popularity data passes a dynamic threshold; 2) analyzing and modeling the relationship between system availability and the number of replicas, and calculating a suitable number of new replicas; 3) evaluating and identifying the popular data in each site, and placing replicas among them; 4) removing files with least cost of average access time when encountering insufficient space for replication. The algorithm was tested using a grid simulator, OptorSim developed by European Data Grid Projects. The simulation results show that the proposed algorithm has better performance in comparison with other algorithms in terms of job execution time, effective network usage and percentage of storage filled.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using the interestingness measure lift to generate association rules 利用兴趣度度量lift生成关联规则
Pub Date : 2015-04-06 DOI: 10.14419/JACST.V4I1.4398
Nada Hussein, A. Alashqur, Bilal I. Sowan
In this digital age, organizations have to deal with huge amounts of data, sometimes called Big Data. In recent years, the volume of data has increased substantially. Consequently, finding efficient and automated techniques for discovering useful patterns and relationships in the data becomes very important. In data mining, patterns and relationships can be represented in the form of association rules. Current techniques for discovering association rules rely on measures such as support for finding frequent patterns and confidence for finding association rules. A shortcoming of confidence is that it does not capture the correlation that exists between the left-hand side (LHS) and the right-hand side (RHS) of an association rule. On the other hand, the interestingness measure lift captures such as correlation in the sense that it tells us whether the LHS influences the RHS positively or negatively. Therefore, using Lift instead of confidence as a criteria for discovering association rules can be more effective. It also gives the user more choices in determining the kind of association rules to be discovered. This in turn helps to narrow down the search space and consequently, improves performance. In this paper, we describe a new approach for discovering association rules that is based on Lift and not based on confidence.
在这个数字时代,组织必须处理大量的数据,有时被称为大数据。近年来,数据量大幅增加。因此,为发现数据中的有用模式和关系而寻找高效和自动化的技术变得非常重要。在数据挖掘中,模式和关系可以用关联规则的形式表示。当前发现关联规则的技术依赖于诸如查找频繁模式的支持和查找关联规则的置信度之类的度量。置信度的一个缺点是,它不能捕捉关联规则的左侧(LHS)和右侧(RHS)之间存在的相关性。另一方面,有趣度度量提升捕获了相关性,它告诉我们LHS对RHS的影响是积极的还是消极的。因此,使用Lift而不是置信度作为发现关联规则的标准可能更有效。它还为用户在确定要发现的关联规则类型方面提供了更多的选择。这反过来又有助于缩小搜索空间,从而提高性能。在本文中,我们描述了一种基于Lift而不是基于置信度的发现关联规则的新方法。
{"title":"Using the interestingness measure lift to generate association rules","authors":"Nada Hussein, A. Alashqur, Bilal I. Sowan","doi":"10.14419/JACST.V4I1.4398","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4398","url":null,"abstract":"In this digital age, organizations have to deal with huge amounts of data, sometimes called Big Data. In recent years, the volume of data has increased substantially. Consequently, finding efficient and automated techniques for discovering useful patterns and relationships in the data becomes very important. In data mining, patterns and relationships can be represented in the form of association rules. Current techniques for discovering association rules rely on measures such as support for finding frequent patterns and confidence for finding association rules. A shortcoming of confidence is that it does not capture the correlation that exists between the left-hand side (LHS) and the right-hand side (RHS) of an association rule. On the other hand, the interestingness measure lift captures such as correlation in the sense that it tells us whether the LHS influences the RHS positively or negatively. Therefore, using Lift instead of confidence as a criteria for discovering association rules can be more effective. It also gives the user more choices in determining the kind of association rules to be discovered. This in turn helps to narrow down the search space and consequently, improves performance. In this paper, we describe a new approach for discovering association rules that is based on Lift and not based on confidence.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning 基于约简特征和机器学习的肝炎快速诊断新方法
Pub Date : 2015-03-31 DOI: 10.14419/JACST.V4I1.4353
Nahid Khorashadizade, H. Rezaei
Hepatitis disease is caused by liver injury. Rapid diagnosis of this disease prevents its development and suffering to cirrhosis of the liver. Data mining is a new branch of science that helps physicians for proper decision making. In data mining using reduction feature and machine learning algorithms are useful for reducing the complexity of the problem and method of disease diagnosis, respectively. In this study, a new algorithm is proposed for hepatitis diagnosis according to Principal Component Analysis (PCA) and Error Minimized Extreme Learning Machine (EMELM). The algorithm includes two stages; in reduction feature phase, missing records were deleted and hepatitis dataset was normalized in [0,1] range. Thereafter, analysis of the principal component was applied for reduction feature. In classification phase, the reduced dataset is classified using EMELM. For evaluation of the algorithm, hepatitis disease dataset from UCI Machine Learning Repository (University of California) was selected. The features of this dataset reduced from 19 to 6 using PCA and the accuracy of the reduced dataset was obtained using EMELM. The results revealed that the proposed hybrid intelligent diagnosis system reached the higher classification accuracy and shorter time compared with other methods.
肝炎是由肝损伤引起的疾病。这种疾病的快速诊断可以防止其发展和肝硬化。数据挖掘是一门新的科学分支,它可以帮助医生做出正确的决策。在数据挖掘中,使用约简特征和机器学习算法分别有助于降低问题和疾病诊断方法的复杂性。本文提出了一种基于主成分分析(PCA)和误差最小化极限学习机(EMELM)的肝炎诊断新算法。该算法包括两个阶段;在约简特征阶段,删除缺失记录,并在[0,1]范围内对肝炎数据集进行归一化。然后,应用主成分分析对特征进行约简。在分类阶段,使用EMELM对约简后的数据集进行分类。为了对算法进行评估,我们选择了来自UCI机器学习库(University of California)的肝炎疾病数据集。利用主成分分析(PCA)将该数据集的特征从19个减少到6个,并利用EMELM获得了约简后的数据集的精度。结果表明,与其他方法相比,所提出的混合智能诊断系统具有更高的分类准确率和更短的分类时间。
{"title":"New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning","authors":"Nahid Khorashadizade, H. Rezaei","doi":"10.14419/JACST.V4I1.4353","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4353","url":null,"abstract":"Hepatitis disease is caused by liver injury. Rapid diagnosis of this disease prevents its development and suffering to cirrhosis of the liver. Data mining is a new branch of science that helps physicians for proper decision making. In data mining using reduction feature and machine learning algorithms are useful for reducing the complexity of the problem and method of disease diagnosis, respectively. In this study, a new algorithm is proposed for hepatitis diagnosis according to Principal Component Analysis (PCA) and Error Minimized Extreme Learning Machine (EMELM). The algorithm includes two stages; in reduction feature phase, missing records were deleted and hepatitis dataset was normalized in [0,1] range. Thereafter, analysis of the principal component was applied for reduction feature. In classification phase, the reduced dataset is classified using EMELM. For evaluation of the algorithm, hepatitis disease dataset from UCI Machine Learning Repository (University of California) was selected. The features of this dataset reduced from 19 to 6 using PCA and the accuracy of the reduced dataset was obtained using EMELM. The results revealed that the proposed hybrid intelligent diagnosis system reached the higher classification accuracy and shorter time compared with other methods.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129430210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran) 通过面向服务的体系结构对成本材料需求进行数据集成(研究案例:pt x garment ungaran)
Pub Date : 2015-03-18 DOI: 10.14419/JACST.V4I1.4309
Erwien Christianto, W. H. Utomo, Wiwin Sulistyo
Data processing is an important part of a garment company. With increasingly complex and developing a garment company, data processing and integration became a very important requirement. The need for data integration in determining the cost of materials becomes a very important part in the garment industry. Data distribution or dissemination from one to another section gives results in data duplication, so that it may cause the data to be inconsistent. In addition, the efficiency of the process in determining the cost of materials is highly needed to achieve the selling price determination target. Nowadays, there is web-based technology, which is capable of handle data integration service, called SOA (Service Oriented Architecture). Business processes (work flows) involving the supplier need to go back to the supplier with the output price that has been determined by the system, can be integrated with Web service with concentration of BPELSOA. By utilizing the SOA technology then data processing and integration problems that occurred in the garment industry could be made into an integrated information system, so that the problems in the garment industry can be solved.
数据处理是服装企业的重要组成部分。随着服装企业的日益复杂和发展,数据处理和集成成为一个非常重要的要求。在服装行业中,对数据集成的需求在确定材料成本方面成为一个非常重要的部分。数据从一个部分分发或传播到另一个部分会导致数据重复,从而可能导致数据不一致。此外,为了实现销售价格的确定目标,在确定材料成本的过程中非常需要效率。目前,有一种能够处理数据集成服务的基于web的技术,称为SOA (service Oriented Architecture)。涉及供应商的业务流程(工作流)需要带着系统确定的输出价格返回到供应商,可以与集中式BPELSOA的Web服务集成。利用SOA技术,将服装行业中出现的数据处理和集成问题整合成一个集成的信息系统,从而解决服装行业中存在的问题。
{"title":"Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran)","authors":"Erwien Christianto, W. H. Utomo, Wiwin Sulistyo","doi":"10.14419/JACST.V4I1.4309","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4309","url":null,"abstract":"Data processing is an important part of a garment company. With increasingly complex and developing a garment company, data processing and integration became a very important requirement. The need for data integration in determining the cost of materials becomes a very important part in the garment industry. Data distribution or dissemination from one to another section gives results in data duplication, so that it may cause the data to be inconsistent. In addition, the efficiency of the process in determining the cost of materials is highly needed to achieve the selling price determination target. Nowadays, there is web-based technology, which is capable of handle data integration service, called SOA (Service Oriented Architecture). Business processes (work flows) involving the supplier need to go back to the supplier with the output price that has been determined by the system, can be integrated with Web service with concentration of BPELSOA. By utilizing the SOA technology then data processing and integration problems that occurred in the garment industry could be made into an integrated information system, so that the problems in the garment industry can be solved.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"76 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel authentication and access control framework in wireless sensor networks 一种新的无线传感器网络认证和访问控制框架
Pub Date : 2015-03-09 DOI: 10.14419/JACST.V4I1.4307
Babak Nouri-Moghaddam, H. Naji
Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a well-implemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel security framework for these networks. The new framework is based on Kerberos authentication and access control system. The Kerberos has been adopted for WSNs by utilizing Bloom Filter data structure and Elliptic Curve cryptography. In the proposed scheme, Bloom Filter data structure is used in a novel way; we have used this data structure to get rid of Public Key’s certificates. By combining Bloom Filter data structure and Elliptic Curve cryptography, we achieved a very light robust security framework that offers Authentication, Access Control, and key sharing services. The analysis results showed that our scheme provides more security services and is more robust in the presence of attacks compared to the previous schemes. In contrast, simulation results indicated that our system had significant improvements over the other schemes in many aspects such as power and time expenditure.
无线传感器网络不断发展成为最具挑战性的研究领域之一。考虑到这些网络的不安全性质以及传感器节点分布在敌对环境中的事实,拥有一个实现良好的安全方案是绝对必要的。考虑到重要的安全服务,如身份验证和访问控制,我们为这些网络提出了一个新的安全框架。该框架基于Kerberos身份验证和访问控制系统。利用Bloom Filter数据结构和椭圆曲线加密技术,将Kerberos技术应用于无线传感器网络。在该方案中,以一种新颖的方式使用了Bloom Filter数据结构;我们已经使用这个数据结构来摆脱公钥的证书。通过结合布隆过滤器数据结构和椭圆曲线加密,我们实现了一个非常轻的健壮的安全框架,提供身份验证,访问控制和密钥共享服务。分析结果表明,与现有方案相比,该方案提供了更多的安全服务,并且在存在攻击的情况下具有更强的鲁棒性。相比之下,仿真结果表明,我们的系统在功耗和时间消耗等许多方面都比其他方案有显着改进。
{"title":"A novel authentication and access control framework in wireless sensor networks","authors":"Babak Nouri-Moghaddam, H. Naji","doi":"10.14419/JACST.V4I1.4307","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4307","url":null,"abstract":"Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a well-implemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel security framework for these networks. The new framework is based on Kerberos authentication and access control system. The Kerberos has been adopted for WSNs by utilizing Bloom Filter data structure and Elliptic Curve cryptography. In the proposed scheme, Bloom Filter data structure is used in a novel way; we have used this data structure to get rid of Public Key’s certificates. By combining Bloom Filter data structure and Elliptic Curve cryptography, we achieved a very light robust security framework that offers Authentication, Access Control, and key sharing services. The analysis results showed that our scheme provides more security services and is more robust in the presence of attacks compared to the previous schemes. In contrast, simulation results indicated that our system had significant improvements over the other schemes in many aspects such as power and time expenditure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategies for enhancing the accuracy and security in ad hoc networks 提高自组织网络的准确性和安全性的策略
Pub Date : 2015-03-04 DOI: 10.14419/JACST.V4I1.4156
Behnam Rahmani Delijani, H. Tavakoli
Ad Hoc networks are a type of mobile wireless networks composed of mobile and stationary nodes which are moving freely and independently or they are stable. Setting up Ad Hoc networks is very simple and as these networks do not need a standard fixed infrastructure and central legal license, their setting up cost is very low. So, in specials, temporary or short-term situations such as flood, earthquake and fire as well as in military environments where all telecommunication platforms are destroyed, these networks are used as a new solution for creating communications between network elements. As Ad Hoc networks have a limited energy and nodes are continuously displacing, consequently, the accuracy of these networks is important. Nodes can be easily added to the network at any time or leave the network. It not only leads to easy creation of a network and its fast, easy and low-cost expansion, but also makes it possible for an enemy to enter the network. Therefore, the security of these networks must also be considered. In this paper, using a new method and imposing limitations on some network nodes, we created a more reliable network with higher accuracy and security.
Ad Hoc网络是由移动节点和固定节点组成的一种移动无线网络,它们自由独立地或稳定地移动。建立Ad Hoc网络非常简单,由于这些网络不需要标准的固定基础设施和中央法律许可,因此其建立成本非常低。因此,在洪水、地震和火灾等特殊、临时或短期情况下,以及在所有电信平台都被破坏的军事环境中,这些网络被用作在网元之间创建通信的新解决方案。由于Ad Hoc网络能量有限,且节点不断迁移,因此网络的准确性非常重要。节点可以在任何时候轻松地加入网络或离开网络。它不仅使网络易于创建和快速、容易、低成本地扩展,而且使敌人有可能进入网络。因此,这些网络的安全性也必须加以考虑。本文采用了一种新的方法,并对一些网络节点施加了限制,从而创建了一个更可靠、精度和安全性更高的网络。
{"title":"Strategies for enhancing the accuracy and security in ad hoc networks","authors":"Behnam Rahmani Delijani, H. Tavakoli","doi":"10.14419/JACST.V4I1.4156","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4156","url":null,"abstract":"Ad Hoc networks are a type of mobile wireless networks composed of mobile and stationary nodes which are moving freely and independently or they are stable. Setting up Ad Hoc networks is very simple and as these networks do not need a standard fixed infrastructure and central legal license, their setting up cost is very low. So, in specials, temporary or short-term situations such as flood, earthquake and fire as well as in military environments where all telecommunication platforms are destroyed, these networks are used as a new solution for creating communications between network elements. As Ad Hoc networks have a limited energy and nodes are continuously displacing, consequently, the accuracy of these networks is important. Nodes can be easily added to the network at any time or leave the network. It not only leads to easy creation of a network and its fast, easy and low-cost expansion, but also makes it possible for an enemy to enter the network. Therefore, the security of these networks must also be considered. In this paper, using a new method and imposing limitations on some network nodes, we created a more reliable network with higher accuracy and security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of business models in e-mobile payment by using multiple criteria decision making 基于多准则决策的电子移动支付商业模式评价
Pub Date : 2015-02-28 DOI: 10.14419/JACST.V4I1.4149
Abdolghader Pourali, Elham Hashempour
Due to the significant growth in the usage of cell phone by customers and its availability, this tool can be considered such the best tool. For e-payment for implementing the mobile payment service, other objects and players should be considered such as banks, operators, service providers and the used technology as the effective interaction role. In addition, for effective optimization of parameters for implementing the mobile payment solution a proper model of business should be used. First of all, in this experiment, different business models in the field of mobile payment and the role of each stakeholder in these models and their positive and negative points are discussed. Moreover, by using method of Multiple Criteria Decision Making, four famous business models of the world are evaluated and the result of this evaluation highlights that the cooperation model is the most Appropriate Model in terms of mobile payment methods.
由于客户使用手机及其可用性的显着增长,该工具可以被认为是最好的工具。对于实施移动支付服务的电子支付,应考虑银行、运营商、服务提供商和使用技术等其他对象和参与者作为有效的交互角色。此外,为了实现移动支付解决方案的参数有效优化,需要使用合适的业务模型。首先,在本次实验中,讨论了移动支付领域的不同商业模式以及各利益相关者在这些模式中的作用及其优缺点。运用多准则决策的方法,对世界上四种著名的商业模式进行了评价,结果表明合作模式是移动支付方式中最合适的模式。
{"title":"An evaluation of business models in e-mobile payment by using multiple criteria decision making","authors":"Abdolghader Pourali, Elham Hashempour","doi":"10.14419/JACST.V4I1.4149","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4149","url":null,"abstract":"Due to the significant growth in the usage of cell phone by customers and its availability, this tool can be considered such the best tool. For e-payment for implementing the mobile payment service, other objects and players should be considered such as banks, operators, service providers and the used technology as the effective interaction role. In addition, for effective optimization of parameters for implementing the mobile payment solution a proper model of business should be used. First of all, in this experiment, different business models in the field of mobile payment and the role of each stakeholder in these models and their positive and negative points are discussed. Moreover, by using method of Multiple Criteria Decision Making, four famous business models of the world are evaluated and the result of this evaluation highlights that the cooperation model is the most Appropriate Model in terms of mobile payment methods.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cluster based approach for wormhole attack detection in wireless sensor networks 基于聚类的无线传感器网络虫洞攻击检测方法
Pub Date : 2015-02-27 DOI: 10.14419/JACST.V4I1.4100
M. Shahryari, H. Naji
Due to the need of cooperation among nodes to relay packets, wireless sensor networks are very vulnerable to attacks in all layers of the network. One of these severe attacks is the wormhole attack. Detection of wormhole attack is hard, because it can be easily implemented by attacker without having knowledge of nodes in the network or it can be compromised by any legal node in the network. To date, the most of proposed protocols to defend against wormhole attacks are made by adopting synchronized clocks, directional antennas or strong assumptions in order to detect wormhole attacks. A method based on clustering is presented in this paper to detect this type of attacks. This method is implemented in static and mobile networks. The superiority of our protocol is that during the attack prevention or attack detection, the malicious nodes are detected and requires no additional hardware or complex calculations. Simulation results are perused with the NS-2 simulator and the protocol has been evaluated in terms of packet drop ratio, throughput, delay and energy consumption compared to a network without or under attack. Simulation results show that our protocol is practical and effective in improving resilience against wormhole attacks.
由于无线传感器网络需要节点之间的合作来转发数据包,因此在网络的各个层都非常容易受到攻击。其中一种严重的攻击是虫洞攻击。由于攻击者在不了解网络节点的情况下可以很容易地实现虫洞攻击,或者可以被网络中的任何合法节点所破坏,因此虫洞攻击的检测是困难的。迄今为止,大多数提出的防御虫洞攻击的协议都是通过采用同步时钟、定向天线或强假设来检测虫洞攻击。本文提出了一种基于聚类的攻击检测方法。该方法已在静态和移动网络中实现。该协议的优势在于,在攻击防范或攻击检测过程中,可以检测到恶意节点,不需要额外的硬件和复杂的计算。使用NS-2模拟器对仿真结果进行了仔细研究,并对该协议进行了分组丢包率、吞吐量、延迟和能耗方面的评估,与没有攻击或受到攻击的网络进行了比较。仿真结果表明,该协议在提高对虫洞攻击的弹性方面具有实用性和有效性。
{"title":"A cluster based approach for wormhole attack detection in wireless sensor networks","authors":"M. Shahryari, H. Naji","doi":"10.14419/JACST.V4I1.4100","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4100","url":null,"abstract":"Due to the need of cooperation among nodes to relay packets, wireless sensor networks are very vulnerable to attacks in all layers of the network. One of these severe attacks is the wormhole attack. Detection of wormhole attack is hard, because it can be easily implemented by attacker without having knowledge of nodes in the network or it can be compromised by any legal node in the network. To date, the most of proposed protocols to defend against wormhole attacks are made by adopting synchronized clocks, directional antennas or strong assumptions in order to detect wormhole attacks. A method based on clustering is presented in this paper to detect this type of attacks. This method is implemented in static and mobile networks. The superiority of our protocol is that during the attack prevention or attack detection, the malicious nodes are detected and requires no additional hardware or complex calculations. Simulation results are perused with the NS-2 simulator and the protocol has been evaluated in terms of packet drop ratio, throughput, delay and energy consumption compared to a network without or under attack. Simulation results show that our protocol is practical and effective in improving resilience against wormhole attacks.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A NEW METHOD FOR COMBINING THE CHANNEL CODING WITH POLAR CODING-BASED ENCRYPTION 一种信道编码与基于极性编码的加密相结合的新方法
Pub Date : 2015-02-25 DOI: 10.14419/JACST.V4I1.4163
Mohammad Kenarkouhi, H. Tavakoli
In this paper, polar codes recently presented by Arikan are introduced. Polar codes have a number of channels with high capacity where information is located. In addition, these codes are composed of a number of channels with low capacity called frozen bits. In the first proposed design, we optimally use frozen and useless bits of the polar code and insert the encryption key on all the bits of the design (information bits and frozen bits). In fact, in Arkian’s proposed 8-bit design, we use 8 encryption keys. Then, in the rest of the article, a method is presented through which the number of encryption keys applied can be reduced. Because, the encryption system is effective and desired in which in addition to the high complexity and the lack of correlation between bits, the minimum number of encryption keys are used.
本文介绍了Arikan最近提出的几种极码。极性码具有许多具有高容量的信道,其中信息位于其中。此外,这些码是由许多称为冻结位的低容量信道组成的。在第一个提出的设计中,我们最佳地使用了极性代码的冻结位和无用位,并在设计的所有位(信息位和冻结位)上插入加密密钥。事实上,在Arkian提出的8位设计中,我们使用了8个加密密钥。然后,在本文的其余部分中,将介绍一种方法,通过这种方法可以减少所应用的加密密钥的数量。因为,除了高复杂性和比特之间缺乏相关性之外,使用最少数量的加密密钥是有效和理想的加密系统。
{"title":"A NEW METHOD FOR COMBINING THE CHANNEL CODING WITH POLAR CODING-BASED ENCRYPTION","authors":"Mohammad Kenarkouhi, H. Tavakoli","doi":"10.14419/JACST.V4I1.4163","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4163","url":null,"abstract":"In this paper, polar codes recently presented by Arikan are introduced. Polar codes have a number of channels with high capacity where information is located. In addition, these codes are composed of a number of channels with low capacity called frozen bits. In the first proposed design, we optimally use frozen and useless bits of the polar code and insert the encryption key on all the bits of the design (information bits and frozen bits). In fact, in Arkian’s proposed 8-bit design, we use 8 encryption keys. Then, in the rest of the article, a method is presented through which the number of encryption keys applied can be reduced. Because, the encryption system is effective and desired in which in addition to the high complexity and the lack of correlation between bits, the minimum number of encryption keys are used.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm 使用隐马尔可娃模型和CART分类算法对欧元日元汇率进行预测
Pub Date : 2015-02-22 DOI: 10.14419/JACST.V4I1.4194
A. Haeri, S. M. Hatefi, K. Rezaie
The goal of this paper is forecasting direction (increase or decrease) of EURJPY exchange rate in a day. For this purpose five major indicators are used. The indicators are exponential moving average (EMA), stochastic oscillator (KD), moving average convergence divergence (MACD), relative strength index (RSI) and Williams %R (WMS %R). Then a hybrid approach using hidden Markov models and CART classification algorithms is developed. Proposed approach is used for forecasting direcation (increase or decrease) of Euro-Yen exchange rates in a day. Also the approach is used for forecasting differnece between intial and maximum exchange rates in a day. As well as it is used for forecasting differnece between intial and minimum exchange rates in a day. Reslut of proposed method is compared with CART and neural network. Comparison shows that the forecasting with proposed method has higher accuracy.
本文的目的是预测欧元日元汇率在一天内的走势(上升或下降)。为此目的,使用了五个主要指标。指标是指数移动平均线(EMA),随机振荡器(KD),移动平均收敛散度(MACD),相对强弱指数(RSI)和威廉姆斯%R (WMS %R)。然后提出了一种基于隐马尔可夫模型和CART分类算法的混合分类方法。提出的方法用于预测欧元日元汇率在一天内的方向(增加或减少)。该方法还可用于预测一天内初始汇率和最高汇率之间的差异。它还用于预测一天内初始汇率和最低汇率之间的差异。将该方法与CART和神经网络进行了比较。对比表明,该方法具有较高的预测精度。
{"title":"Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm","authors":"A. Haeri, S. M. Hatefi, K. Rezaie","doi":"10.14419/JACST.V4I1.4194","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4194","url":null,"abstract":"The goal of this paper is forecasting direction (increase or decrease) of EURJPY exchange rate in a day. For this purpose five major indicators are used. The indicators are exponential moving average (EMA), stochastic oscillator (KD), moving average convergence divergence (MACD), relative strength index (RSI) and Williams %R (WMS %R). Then a hybrid approach using hidden Markov models and CART classification algorithms is developed. Proposed approach is used for forecasting direcation (increase or decrease) of Euro-Yen exchange rates in a day. Also the approach is used for forecasting differnece between intial and maximum exchange rates in a day. As well as it is used for forecasting differnece between intial and minimum exchange rates in a day. Reslut of proposed method is compared with CART and neural network. Comparison shows that the forecasting with proposed method has higher accuracy.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"93 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126228313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Advanced Computer Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1