首页 > 最新文献

Journal of Advanced Computer Science and Technology最新文献

英文 中文
Coset decomposition method for storing and decoding fingerprint data 一种用于指纹数据存储和解码的协集分解方法
Pub Date : 2014-12-26 DOI: 10.14419/JACST.V4I1.3958
Mohamed Sayed
Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.
生物识别技术,如指纹、虹膜、面部、声音、步态和手,通常用于访问控制、身份验证和加密,而不是PIN和密码。本文提出了一种综合征解码技术,为存储和匹配各种生物特征数据提供了一种安全的方法。我们将一种称为协集分解的代数编码技术应用于指纹生物识别模型。该算法揭示了注册指纹和探测指纹之间的匹配关系,并用MATLAB进行了建模和实现。
{"title":"Coset decomposition method for storing and decoding fingerprint data","authors":"Mohamed Sayed","doi":"10.14419/JACST.V4I1.3958","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3958","url":null,"abstract":"Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid KNN-MLP algorithm to diagnose bipolar disorder 一种混合KNN-MLP算法诊断双相情感障碍
Pub Date : 2014-12-25 DOI: 10.14419/JACST.V4I1.3922
M. Ghasemi, M. Khalili
In this paper an attempt has been made to the other corner of the power of neural networks. According to the neural network in the diagnosis of diseases, we use neural network models for diagnosing bipolar disorder; bipolar disorder is the common disorder of depression mood. We have used two neural network models: MLP & KNN. With different percentages of the implementation of neural network models is discussed. And the error was calculated for each model. We can by using the MLP model achieve an error of 16% for the diagnosis of bipolar disorder.
本文对神经网络的另一个方面进行了尝试。根据神经网络在疾病诊断中的应用,我们采用神经网络模型对双相情感障碍进行诊断;双相情感障碍是抑郁情绪的常见障碍。我们使用了两种神经网络模型:MLP和KNN。用不同的百分比对神经网络模型的实现进行了讨论。并对每个模型的误差进行了计算。我们可以通过使用MLP模型实现双相情感障碍诊断的误差为16%。
{"title":"A hybrid KNN-MLP algorithm to diagnose bipolar disorder","authors":"M. Ghasemi, M. Khalili","doi":"10.14419/JACST.V4I1.3922","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3922","url":null,"abstract":"In this paper an attempt has been made to the other corner of the power of neural networks. According to the neural network in the diagnosis of diseases, we use neural network models for diagnosing bipolar disorder; bipolar disorder is the common disorder of depression mood. We have used two neural network models: MLP & KNN. With different percentages of the implementation of neural network models is discussed. And the error was calculated for each model. We can by using the MLP model achieve an error of 16% for the diagnosis of bipolar disorder.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126173048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on SDN, the future of networking SDN的调查,未来的网络
Pub Date : 2014-11-29 DOI: 10.14419/JACST.V3I2.3754
Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary
Software Defined Networking (SDN) is an emerging architecture which decouples networks control plane and data plane physically. It makes control plane programmable trough a centralized controller, and builds intelligent and flexible networks. The OpenFlow is one of the most famous SDN protocols, which acts as a southbound interface between control plane and data plane. In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced. In addition to general architecture of SDN, different wireless architectures are discussed. Here, also potential SDN’s applications and research areas including hot topics such as Information Centric Networks, Cloud and datacenters, multimedia, wireless and mobile networks over SDN are reviewed.
软件定义网络(SDN)是一种将网络控制平面和数据平面物理解耦的新兴网络体系结构。通过集中控制器使控制平面可编程,构建智能、灵活的网络。OpenFlow是最著名的SDN协议之一,它作为控制平面和数据平面之间的南向接口。在本次调查中,除了不同版本的OpenFlow之外,还介绍了SDN的实现方法和不同的南向接口。除了SDN的一般架构外,还讨论了不同的无线架构。本文还对SDN的潜在应用和研究领域进行了综述,包括信息中心网络、云和数据中心、多媒体、基于SDN的无线和移动网络等热点问题。
{"title":"A survey on SDN, the future of networking","authors":"Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary","doi":"10.14419/JACST.V3I2.3754","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3754","url":null,"abstract":"Software Defined Networking (SDN) is an emerging architecture which decouples networks control plane and data plane physically. It makes control plane programmable trough a centralized controller, and builds intelligent and flexible networks. The OpenFlow is one of the most famous SDN protocols, which acts as a southbound interface between control plane and data plane. In this survey, SDN implementation approaches and different southbound interfaces, beside different version of OpenFlow, are introduced. In addition to general architecture of SDN, different wireless architectures are discussed. Here, also potential SDN’s applications and research areas including hot topics such as Information Centric Networks, Cloud and datacenters, multimedia, wireless and mobile networks over SDN are reviewed.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126277475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Reliability evaluation of a payment model in mobile e-commerce using colored Petri net 基于彩色Petri网的移动电子商务支付模型可靠性评估
Pub Date : 2014-11-09 DOI: 10.14419/JACST.V3I2.3663
Abdolghader Pourali, M. V. Malakooti, Muhammad Hussein Yektaie
In general, a mobile payment system in mobile e-commerce must have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders, in this paper we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce presented at the International Conference) [18]. Keywords : Reliability, Colored Petri Net, Assessment, Payment Models, M-Commerce.
一般来说,移动电子商务中的移动支付系统必须具有很高的安全性,这样用户才能信任它在移动支付系统中进行商业交易、销售、支付金融交易等。由于电子商务中的架构或支付模型仅显示了用户和抵押人之间的交互和协作方式,而没有向利益相关者提供任何对金融交易有效性和信心的评估,因此在本文中,我们试图使用正式模型和彩色Petri网对移动电子商务中移动支付模型的可靠性进行详细评估。最后,我们证明了该系统的可靠性具有很高的价值(案例研究:国际会议上提出的移动商务中的安全支付模型)[18]。关键词:可靠性,有色Petri网,评估,支付模式,移动商务
{"title":"Reliability evaluation of a payment model in mobile e-commerce using colored Petri net","authors":"Abdolghader Pourali, M. V. Malakooti, Muhammad Hussein Yektaie","doi":"10.14419/JACST.V3I2.3663","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3663","url":null,"abstract":"In general, a mobile payment system in mobile e-commerce must have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders, in this paper we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce presented at the International Conference) [18]. Keywords : Reliability, Colored Petri Net, Assessment, Payment Models, M-Commerce.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A neural network based congestion control algorithm for content-centric networks 基于神经网络的内容中心网络拥塞控制算法
Pub Date : 2014-10-23 DOI: 10.14419/JACST.V3I2.3696
Parisa Bazmi, Manijeh Keshtgary
Communication across the Internet has transformed over the years, generated primarily by changes in the importance of content distribution. In the twenty-first century, people are more concerned with the content rather than the location of the information. Content-Centric Networking (CCN) is a new Internet architecture, which aims to access content by a name rather than the IP address of a host. Having the content, CCN which is natively pull-based functions based on the requests received from customers. It is also combined with the availability of in-network chaching. Because of the availability of in-network caching in CCN, chunks may be served by multiple sources. This multi-path transfer in CCN makes TCP-based congestion control mechanisms inefficient for CCN. In this paper a new congestion control algorithm is proposed, which is based on Neural Network prediction over content-centric networks. The designed NN is implemented in each router to predict adaptively the existence of the congestion on link given the current status of the network. The results demonstrate that the proposed congestion control algorithm can effectively improve throughput by 85.53%. This improvement is done by preventing queue overflow from happening, which will result in reductions in packet drop in the network. Keywords : Content-Centric Network, Congestion Control, Drop Prediction, Named Data Networking, Neural Network.
多年来,互联网上的通信已经发生了变化,主要是由于内容分发重要性的变化。在21世纪,人们更关心的是信息的内容而不是信息的位置。内容中心网络(content - centric Networking, CCN)是一种新的Internet体系结构,其目的是通过名称而不是主机的IP地址来访问内容。拥有内容,CCN是基于从客户收到的请求的原生基于拉的功能。它还与网络内缓存的可用性相结合。由于CCN中网络内缓存的可用性,块可以由多个源提供。CCN中的这种多路径传输使得基于tcp的拥塞控制机制对CCN来说效率低下。本文提出了一种基于神经网络预测的内容中心网络拥塞控制算法。设计的神经网络在每个路由器上实现,根据网络的当前状态自适应地预测链路上是否存在拥塞。结果表明,本文提出的拥塞控制算法可有效提高吞吐量85.53%。这种改进是通过防止队列溢出来实现的,这将导致网络中丢包的减少。关键词:内容中心网络,拥塞控制,丢弃预测,命名数据网络,神经网络。
{"title":"A neural network based congestion control algorithm for content-centric networks","authors":"Parisa Bazmi, Manijeh Keshtgary","doi":"10.14419/JACST.V3I2.3696","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3696","url":null,"abstract":"Communication across the Internet has transformed over the years, generated primarily by changes in the importance of content distribution. In the twenty-first century, people are more concerned with the content rather than the location of the information. Content-Centric Networking (CCN) is a new Internet architecture, which aims to access content by a name rather than the IP address of a host. Having the content, CCN which is natively pull-based functions based on the requests received from customers. It is also combined with the availability of in-network chaching. Because of the availability of in-network caching in CCN, chunks may be served by multiple sources. This multi-path transfer in CCN makes TCP-based congestion control mechanisms inefficient for CCN. In this paper a new congestion control algorithm is proposed, which is based on Neural Network prediction over content-centric networks. The designed NN is implemented in each router to predict adaptively the existence of the congestion on link given the current status of the network. The results demonstrate that the proposed congestion control algorithm can effectively improve throughput by 85.53%. This improvement is done by preventing queue overflow from happening, which will result in reductions in packet drop in the network. Keywords : Content-Centric Network, Congestion Control, Drop Prediction, Named Data Networking, Neural Network.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Securing the Cloud: Threats, Attacks and Mitigation Techniques 保护云:威胁、攻击和缓解技术
Pub Date : 2014-10-21 DOI: 10.14419/JACST.V3I2.3588
M. Alani
This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given. Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.
本文旨在介绍当前云计算的威胁和攻击,以及安全措施。本文讨论了对云计算最有效的威胁和攻击,如数据泄露、数据丢失、服务流量劫持等。讨论了这些攻击的严重性和影响以及这些攻击的现实例子。该文件还提出了可用于减少或消除所讨论的威胁风险的缓解技术。此外,还给出了一般的云安全建议。关键词:云,云计算,安全,威胁,攻击,SaaS, PaaS, IaaS。
{"title":"Securing the Cloud: Threats, Attacks and Mitigation Techniques","authors":"M. Alani","doi":"10.14419/JACST.V3I2.3588","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3588","url":null,"abstract":"This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given. Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Cloud computing: use cases & various applications 云计算:用例和各种应用
Pub Date : 2014-10-17 DOI: 10.14419/JACST.V3I2.3602
S. M. Hashemi, A. Hanani
As Cloud Computing has become more and more famous and popular, various Cloud Computing architectures, models and infrastructures have been defined, given their specific circumstances for the applications. Currently, many Cloud definitions, applications and samples can be helpful as a reference for using a Cloud Computing service. As Cloud Computing technology is being used to minimize the cost of computing resources, many enterprises gained interest of migrating their old system to the Cloud Computing system. This further illustrates the importance the usage of Cloud Computing, therefore, this paper investigates some distributed computing model especially cloud computing to clarify which definition, usage, applications and use-cases are more useful. Further, this article attempts to introduce various models of cloud computing, services, use-cases and applications. Finally, we made a comparison between various companies that are providing Cloud Computing facilities. Keywords : Cloud Computing, E-Services, Service Computing, UML, RUP.
随着云计算变得越来越有名和流行,各种云计算体系结构、模型和基础设施已经被定义,并给出了应用程序的特定环境。目前,许多云定义、应用程序和示例都可以作为使用云计算服务的参考。随着云计算技术被用于最小化计算资源成本,许多企业对将其旧系统迁移到云计算系统产生了兴趣。这进一步说明了云计算使用的重要性,因此,本文研究了一些分布式计算模型,特别是云计算,以澄清哪些定义、用法、应用和用例更有用。此外,本文试图介绍云计算、服务、用例和应用程序的各种模型。最后,我们对提供云计算设施的不同公司进行了比较。关键词:云计算,电子服务,服务计算,UML, RUP。
{"title":"Cloud computing: use cases & various applications","authors":"S. M. Hashemi, A. Hanani","doi":"10.14419/JACST.V3I2.3602","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3602","url":null,"abstract":"As Cloud Computing has become more and more famous and popular, various Cloud Computing architectures, models and infrastructures have been defined, given their specific circumstances for the applications. Currently, many Cloud definitions, applications and samples can be helpful as a reference for using a Cloud Computing service. As Cloud Computing technology is being used to minimize the cost of computing resources, many enterprises gained interest of migrating their old system to the Cloud Computing system. This further illustrates the importance the usage of Cloud Computing, therefore, this paper investigates some distributed computing model especially cloud computing to clarify which definition, usage, applications and use-cases are more useful. Further, this article attempts to introduce various models of cloud computing, services, use-cases and applications. Finally, we made a comparison between various companies that are providing Cloud Computing facilities. Keywords : Cloud Computing, E-Services, Service Computing, UML, RUP.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A new high capacity steganography based on bit-inverting method in DWT domain 基于位反转的DWT域高容量隐写新方法
Pub Date : 2014-10-17 DOI: 10.14419/JACST.V3I2.3404
Mahnoosh Sadat Azaminezhad, A. Bidgoli
Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure.
隐写术是一种将秘密信息嵌入封面图像并以一种无法检测信息存在的方式传输的技术。本文提出了一种由霍夫曼编码和位反转两种编码算法组成的新技术。在该技术中,我们提出了一种改进的安全高容量隐写方案,将文本或图像等秘密信息隐藏到封面图像中。仿真结果表明,该算法具有良好的感知不可见性和高容量,同时具有一定的安全性。
{"title":"A new high capacity steganography based on bit-inverting method in DWT domain","authors":"Mahnoosh Sadat Azaminezhad, A. Bidgoli","doi":"10.14419/JACST.V3I2.3404","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3404","url":null,"abstract":"Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Range of outputs precise of digits rounding in SPSS and MS Excel 输出范围精确的数字四舍五入在SPSS和MS Excel
Pub Date : 2014-10-03 DOI: 10.14419/jacst.v3i2.3573
Z. Al-Hashami
The statistical operations done by many specialist programs, by them can do these operations fluently and precisely. There are many functions in such programs can calculate in SAS, STAT and the analytical program SPSS. There is Microsoft Excel program that is calculate like these functions. The level of some programs may be different than others within these functions they are calculating. From these functions are Sum, Average, Maximum and Minimum. Round function is also from these functions that can measure it's accuracy through this research. In this research i chose ten digits numbers and I also chose three criteria under, equal and more than 5. According to that the rounding operations are done based on if wanted decimal place is less, equal or higher than 5. Rounding applied on ten digits using SPSS and MS Excel programs. The outputs findings are the same except that Microsoft Excel is truncating the last zeroes of the digit after the decimal point. Wherever the decimal place specified in the digit is want it will truncate after the decimal point. The SPSS is more precise than MS Excel based on the decimal place in the digit number wanted statistically and analytically. Keywords : Decimal Place, Digit, Excel, Function, Round.
由许多专业程序完成的统计操作,通过它们可以流畅、准确地完成这些操作。这些程序中有许多功能可以在SAS, STAT和分析程序SPSS中进行计算。微软的Excel程序就是用来计算这些函数的。在它们所计算的这些函数中,有些程序的级别可能与其他程序不同。这些函数包括Sum, Average, Maximum和Minimum。通过本文的研究,圆形函数也可以从这些函数中衡量其精度。在这个研究中,我选择了十位数,我也选择了三个标准下,等于和大于5。据此,舍入运算是根据所需的小数位数小于、等于或大于5来完成的。使用SPSS和MS Excel程序对十位数进行四舍五入。输出结果是相同的,只是Microsoft Excel截断了小数点后数字的最后一个零。只要在数字中指定了小数点,它就会在小数点后截断。SPSS比MS Excel更精确,基于统计和分析所需数字的小数点。关键词:小数点,数字,Excel,函数,舍入。
{"title":"Range of outputs precise of digits rounding in SPSS and MS Excel","authors":"Z. Al-Hashami","doi":"10.14419/jacst.v3i2.3573","DOIUrl":"https://doi.org/10.14419/jacst.v3i2.3573","url":null,"abstract":"The statistical operations done by many specialist programs, by them can do these operations fluently and precisely. There are many functions in such programs can calculate in SAS, STAT and the analytical program SPSS. There is Microsoft Excel program that is calculate like these functions. The level of some programs may be different than others within these functions they are calculating. From these functions are Sum, Average, Maximum and Minimum. Round function is also from these functions that can measure it's accuracy through this research. In this research i chose ten digits numbers and I also chose three criteria under, equal and more than 5. According to that the rounding operations are done based on if wanted decimal place is less, equal or higher than 5. Rounding applied on ten digits using SPSS and MS Excel programs. The outputs findings are the same except that Microsoft Excel is truncating the last zeroes of the digit after the decimal point. Wherever the decimal place specified in the digit is want it will truncate after the decimal point. The SPSS is more precise than MS Excel based on the decimal place in the digit number wanted statistically and analytically. Keywords : Decimal Place, Digit, Excel, Function, Round.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions 6LoWPAN-RPL网络的拒绝服务攻击:问题和实际解决方案
Pub Date : 2014-09-15 DOI: 10.14419/JACST.V3I2.3321
A. Rghioui, Anass Khannous, M. Bouhorma
RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.
RPL (Routing Protocol for Low-power and lossy networks)是一种特殊的路由协议,用于优化6LoWPAN (IPv6 over Low-power Wireless Personal Area Network)的运行。由于6LoWPAN受到电池、处理器、内存和带宽等资源的限制,影响了RPL协议的性能。从安全的角度来看,这将使RPL容易受到几种直接或间接的威胁。因此,加密系统不足以保护RPL免受内部攻击;来自网络的受损节点可能会导致不希望的操作而不会被这些系统检测到。应该使用入侵检测系统(IDS),但考虑到6LoWPAN的性质,这并不容易;一方面是资源的限制,另一方面是通过互联网对外开放。本文主要研究拒绝服务(DoS)攻击,确定了选择兼容IDS时应考虑的因素,并给出了一些我们认为对基于6LoWPAN-RPL网络有效的解决方案。关键词:RPL, ROLL, 6LoWPAN, IDS, DoS,网络安全。
{"title":"Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions","authors":"A. Rghioui, Anass Khannous, M. Bouhorma","doi":"10.14419/JACST.V3I2.3321","DOIUrl":"https://doi.org/10.14419/JACST.V3I2.3321","url":null,"abstract":"RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet. In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks Keywords: RPL, ROLL, 6LoWPAN, IDS, DoS, Network security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
Journal of Advanced Computer Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1