首页 > 最新文献

2014 17th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
A Comparative Study of Chebyshev Functional Link Artificial Neural Network, Multi-layer Perceptron and Decision Tree for Credit Card Fraud Detection Chebyshev函数链接人工神经网络、多层感知器和决策树在信用卡欺诈检测中的比较研究
M. Mishra, Rajashree Dash
With introduction of online transaction the fraudulent activities through World Wide Web have increased rapidly. It's not only affecting common people but also making them lose huge amount of money. Online transaction basically takes place between merchant and customer, and in this case neither customer nor the card needs to be present at the time of transaction so merchant does not know that whether the customer in the other end is an authorized person or fraudster, so it may lead to an unusual transaction. This kind of online transaction can be easily done using stolen credit card information of a cardholder. To detect status of the current transaction it is imperative to analyze all the previous transactions made by a genuine card holder to know the kind of pattern he/she uses. Based on these patterns new transaction can be categorized as either fraud or legal. There are few data mining techniques which help us to detect a certain pattern on complex and large data sets. In this paper it is proposed to compare Decision Tree, Multi-Layer Perceptron (MLP) and Chebyshev functional link artificial neural network (CFLANN) in terms of their classification accuracy and elapsed time for credit card fraud detection.
随着网上交易的引入,通过万维网进行的欺诈活动迅速增加。这不仅影响到普通人,而且使他们损失了大量的金钱。网上交易基本上是在商家和顾客之间进行的,在这种情况下,顾客和卡都不需要在交易时在场,所以商家不知道另一端的顾客是被授权人还是骗子,所以这可能会导致不寻常的交易。这种网上交易很容易通过盗取持卡人的信用卡信息来实现。为了检测当前交易的状态,必须分析一个真正的持卡人以前的所有交易,以了解他/她使用的是哪种模式。基于这些模式,新交易可以分为欺诈交易和合法交易两类。很少有数据挖掘技术可以帮助我们在复杂和大型数据集中检测特定的模式。本文提出比较决策树、多层感知器(MLP)和切比雪夫函数链接人工神经网络(CFLANN)在信用卡欺诈检测中的分类精度和运行时间。
{"title":"A Comparative Study of Chebyshev Functional Link Artificial Neural Network, Multi-layer Perceptron and Decision Tree for Credit Card Fraud Detection","authors":"M. Mishra, Rajashree Dash","doi":"10.1109/ICIT.2014.25","DOIUrl":"https://doi.org/10.1109/ICIT.2014.25","url":null,"abstract":"With introduction of online transaction the fraudulent activities through World Wide Web have increased rapidly. It's not only affecting common people but also making them lose huge amount of money. Online transaction basically takes place between merchant and customer, and in this case neither customer nor the card needs to be present at the time of transaction so merchant does not know that whether the customer in the other end is an authorized person or fraudster, so it may lead to an unusual transaction. This kind of online transaction can be easily done using stolen credit card information of a cardholder. To detect status of the current transaction it is imperative to analyze all the previous transactions made by a genuine card holder to know the kind of pattern he/she uses. Based on these patterns new transaction can be categorized as either fraud or legal. There are few data mining techniques which help us to detect a certain pattern on complex and large data sets. In this paper it is proposed to compare Decision Tree, Multi-Layer Perceptron (MLP) and Chebyshev functional link artificial neural network (CFLANN) in terms of their classification accuracy and elapsed time for credit card fraud detection.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"67 1","pages":"228-233"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82551345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network 无线体域网络实现中的安全问题和隐私问题
Manoj Kumar
The rapid growth of elderly population is a global concern and a burden on healthcare services as special health challenges appear for this segment of the population. An innovative way of patient monitoring is possible due to the recent advancements in electronics that have emerged with a number of devices which can provide continuous, real time remote healthcare monitoring to the patients even if they are freely moving around and not in hospital beds. The constant miniaturization of these electronic devices has made it possible to wear these sensors either on the clothing or body or even implanted inside the body. An unprecedented growth of smart phones and Internet technology all over the world would be a boon in this area. The recorded information, sent by these wearable sensors can be collected locally using some PDA or mobile phone. These collected medical data values may be analyzed in brief against the stored threshold values using an app on the mobile phone in real time. Collective Information may be transmitted to a centralized server periodically or immediately in case of emergency medical response required in life critical situations. The submitted medical information is used for clinical diagnosis & experts' advice and long term storage in healthcare database for future references. In this paper we discuss architecture of the Healthcare System and asses the security issues and privacy concerns while collecting patient medical data from sensors to mobile device and further submitting this data to the centralized server. The security and privacy protection of sensitive and private patient medical data is a major unsolved concern and a break into the system is possible. We also discuss the other challenges in the implementation of WBAN and provide a conclusion.
老年人口的迅速增长是一个全球关注的问题,也是医疗保健服务的负担,因为这部分人口出现了特殊的健康挑战。由于电子产品的最新进步,出现了许多设备,可以为患者提供连续、实时的远程医疗保健监控,即使他们自由走动,也不在医院病床上,因此有可能采用一种创新的患者监控方式。这些电子设备的不断小型化使得这些传感器可以穿在衣服上或身体上,甚至可以植入体内。智能手机和互联网技术在全球范围内的空前增长将是这一领域的福音。这些可穿戴传感器发送的记录信息可以通过PDA或手机在本地收集。这些收集到的医疗数据值可以使用手机上的应用程序实时对存储的阈值进行简要分析。在生命危急情况下需要紧急医疗响应时,可以定期或立即将集体信息传输到中央服务器。提交的医疗信息用于临床诊断和专家建议,并长期存储在医疗数据库中,以备将来参考。在本文中,我们讨论了医疗保健系统的体系结构,并在从传感器到移动设备收集患者医疗数据并进一步将这些数据提交给集中式服务器时,评估了安全问题和隐私问题。敏感和私人患者医疗数据的安全和隐私保护是一个主要的未解决的问题,并且可能会闯入系统。我们还讨论了WBAN实施中的其他挑战,并给出了结论。
{"title":"Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network","authors":"Manoj Kumar","doi":"10.1109/ICIT.2014.73","DOIUrl":"https://doi.org/10.1109/ICIT.2014.73","url":null,"abstract":"The rapid growth of elderly population is a global concern and a burden on healthcare services as special health challenges appear for this segment of the population. An innovative way of patient monitoring is possible due to the recent advancements in electronics that have emerged with a number of devices which can provide continuous, real time remote healthcare monitoring to the patients even if they are freely moving around and not in hospital beds. The constant miniaturization of these electronic devices has made it possible to wear these sensors either on the clothing or body or even implanted inside the body. An unprecedented growth of smart phones and Internet technology all over the world would be a boon in this area. The recorded information, sent by these wearable sensors can be collected locally using some PDA or mobile phone. These collected medical data values may be analyzed in brief against the stored threshold values using an app on the mobile phone in real time. Collective Information may be transmitted to a centralized server periodically or immediately in case of emergency medical response required in life critical situations. The submitted medical information is used for clinical diagnosis & experts' advice and long term storage in healthcare database for future references. In this paper we discuss architecture of the Healthcare System and asses the security issues and privacy concerns while collecting patient medical data from sensors to mobile device and further submitting this data to the centralized server. The security and privacy protection of sensitive and private patient medical data is a major unsolved concern and a break into the system is possible. We also discuss the other challenges in the implementation of WBAN and provide a conclusion.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"123 1","pages":"58-62"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89267370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Artificial Intelligence Based Fault Location in a Distribution System 基于人工智能的配电系统故障定位
P. Ray, D. Mishra
A hybrid technique for fault distance estimation in a distribution line with wind farm is presented in this paper. Here, one cycle of post fault current samples are taken for fault location from the distributed generation end. The collected samples are then decomposed by wavelet transform and thereafter six statistical features are extracted from the reconstructed detail coefficients of the current signal. Further best features are selected from the total feature set by forward feature selection method. These selected features are then fed as input to the artificial neural network for fault location. In the proposed method, the simulation conditions for the test pattern are completely different from the train one in order to make it robust. Simulation result shows that the proposed hybrid fault location method gives high accuracy for the distribution system.
提出了一种用于带风电场配电线路故障距离估计的混合方法。在这里,从分布式发电端采集一个周期的故障后电流样本进行故障定位。然后对采集到的样本进行小波变换分解,从重构的电流信号细节系数中提取6个统计特征。通过前向特征选择方法从总特征集中进一步选择最佳特征。然后将这些选择的特征作为输入输入到人工神经网络中进行故障定位。在该方法中,测试模式的仿真条件与训练模式完全不同,以保证其鲁棒性。仿真结果表明,所提出的混合故障定位方法对配电系统具有较高的定位精度。
{"title":"Artificial Intelligence Based Fault Location in a Distribution System","authors":"P. Ray, D. Mishra","doi":"10.1109/ICIT.2014.10","DOIUrl":"https://doi.org/10.1109/ICIT.2014.10","url":null,"abstract":"A hybrid technique for fault distance estimation in a distribution line with wind farm is presented in this paper. Here, one cycle of post fault current samples are taken for fault location from the distributed generation end. The collected samples are then decomposed by wavelet transform and thereafter six statistical features are extracted from the reconstructed detail coefficients of the current signal. Further best features are selected from the total feature set by forward feature selection method. These selected features are then fed as input to the artificial neural network for fault location. In the proposed method, the simulation conditions for the test pattern are completely different from the train one in order to make it robust. Simulation result shows that the proposed hybrid fault location method gives high accuracy for the distribution system.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"73 1","pages":"18-23"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86404467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Error Masking of Transient Faults: Exploration of a Fault Tolerant Datapath Based on User Specified Power and Delay Budget 暂态故障的错误屏蔽:基于用户指定功率和延迟预算的容错数据路径探索
A. Sengupta, Saumya Bhadauria
This paper presents a novel exploration process of an optimal fault tolerant data path based on user specified power and delay budget during high level synthesis (HLS) that is capable of masking error occurred through single and multi cycle transient faults. The exploration framework is driven through bio-mimicking of E. Coli bacterium lifecycle. The major novelties of this approach are as follows: a) novel multi-cycle fault tolerant algorithm, b) novel design space exploration (DSE) approach that combines proposed fault tolerant algorithm along with user specified conflicting power-delay constraint that guides this intractable search problem to reach an optimal solution, c) novel double modular redundant (DMR) system with equivalent circuit scheme that performs the equivalent function of extracting the correct output as conventionally done using the concept of triple modular redundant (TMR) and voter. Results indicated an average improvement in quality of results (QoR) of >24% and reduction in hardware usage of > 57 % were obtained compared to a recent similar approach.
本文提出了一种基于用户指定功率和延迟预算的高阶综合(HLS)最优容错数据路径的探索过程,该路径能够屏蔽单周期和多周期瞬态故障产生的错误。探索框架是通过对大肠杆菌生命周期的生物模拟来驱动的。这种方法的主要新颖之处如下:a)新颖的多周期容错算法;b)新颖的设计空间探索(DSE)方法,该方法将所提出的容错算法与用户指定的冲突功率延迟约束相结合,指导这一棘手的搜索问题达到最优解;c)具有等效电路方案的新型双模冗余(DMR)系统,该系统执行提取正确输出的等效功能,与传统使用三模冗余(TMR)和投票人的概念相同。结果表明,与最近的类似方法相比,结果质量(QoR)的平均改善>24%,硬件使用减少> 57%。
{"title":"Error Masking of Transient Faults: Exploration of a Fault Tolerant Datapath Based on User Specified Power and Delay Budget","authors":"A. Sengupta, Saumya Bhadauria","doi":"10.1109/ICIT.2014.15","DOIUrl":"https://doi.org/10.1109/ICIT.2014.15","url":null,"abstract":"This paper presents a novel exploration process of an optimal fault tolerant data path based on user specified power and delay budget during high level synthesis (HLS) that is capable of masking error occurred through single and multi cycle transient faults. The exploration framework is driven through bio-mimicking of E. Coli bacterium lifecycle. The major novelties of this approach are as follows: a) novel multi-cycle fault tolerant algorithm, b) novel design space exploration (DSE) approach that combines proposed fault tolerant algorithm along with user specified conflicting power-delay constraint that guides this intractable search problem to reach an optimal solution, c) novel double modular redundant (DMR) system with equivalent circuit scheme that performs the equivalent function of extracting the correct output as conventionally done using the concept of triple modular redundant (TMR) and voter. Results indicated an average improvement in quality of results (QoR) of >24% and reduction in hardware usage of > 57 % were obtained compared to a recent similar approach.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"60 1","pages":"345-350"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88255548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity 一种有效降低时间复杂度的基于极小点到极小点距离的索引指纹匹配方法
Subhas Barman, Samiran Chattopadhyay, D. Samanta, Sujoy Bag, G. Show
Fingerprint matching is the main module of fingerprint-based person authentication system. Accuracy of fingerprint matching is an important objective of this type authentication system. Multiple features are used for better matching accuracy but more features add more computational complexity as well as time and space complexity. In this paper, we proposed an approach of fingerprint based authentication system where fingerprint matching is carried out using spacial information (distance) of minutiae points only. This approach is simple and it needs very small space to store templates. We have used an indexing technique to speed up the matching process. In our experiment, we have used FVC2004 fingerprint data-set as input data and investigated the false non-match ratio and false matching ratio for DB2, DB3 and DB4 also.
指纹匹配是基于指纹的身份认证系统的主要模块。指纹匹配的准确性是该类型认证系统的一个重要目标。使用多个特征可以提高匹配精度,但更多的特征会增加计算复杂度和时间和空间复杂度。本文提出了一种基于指纹的身份认证系统,该系统仅利用极小点的空间信息(距离)进行指纹匹配。这种方法很简单,只需要很小的空间来存储模板。我们使用了索引技术来加快匹配过程。在我们的实验中,我们使用FVC2004指纹数据集作为输入数据,并研究了DB2、DB3和DB4的假不匹配率和假匹配率。
{"title":"An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity","authors":"Subhas Barman, Samiran Chattopadhyay, D. Samanta, Sujoy Bag, G. Show","doi":"10.1109/ICIT.2014.46","DOIUrl":"https://doi.org/10.1109/ICIT.2014.46","url":null,"abstract":"Fingerprint matching is the main module of fingerprint-based person authentication system. Accuracy of fingerprint matching is an important objective of this type authentication system. Multiple features are used for better matching accuracy but more features add more computational complexity as well as time and space complexity. In this paper, we proposed an approach of fingerprint based authentication system where fingerprint matching is carried out using spacial information (distance) of minutiae points only. This approach is simple and it needs very small space to store templates. We have used an indexing technique to speed up the matching process. In our experiment, we have used FVC2004 fingerprint data-set as input data and investigated the false non-match ratio and false matching ratio for DB2, DB3 and DB4 also.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"31 1","pages":"179-183"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88323431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Model for Prediction of Human Depression Using Apriori Algorithm 基于Apriori算法的人类抑郁预测模型
L. Jena, N. K. Kamila
Depression a latest epidemic of modern era has always drawn the attention of researcher's to find & evaluate the level, causes & prevention. According to psychiatrists it's not a psychological disorder but it creates the stimulation & simulation of co-ordination failure. The worst case of the leading depression level may contemplates a person to attempt suicide, loss of energy, insomnia etc. This epidemic causes severe personal and public health challenges. Each year thousands of millions of people are suffering from depression and a few receives adequate treatment. Keeping view at the trend of predicting, this paper has been proposed & tried to find out the persons affected by depression and their level of illness. The work is self motivated. Here the concept of apriori algorithm & association rule mining is used in order to extract the information from a large collection of database of concerned persons.
抑郁症作为现代最新的一种流行病,其发病水平、成因及防治一直受到研究者的关注。根据精神科医生的说法,这不是一种心理障碍,但它会产生协调失败的刺激和模拟。最严重的抑郁水平可能是一个人试图自杀,失去精力,失眠等。这种流行病对个人和公共卫生造成严重挑战。每年有成千上万的人患有抑郁症,只有少数人得到适当的治疗。鉴于预测的趋势,本文提出并试图找出受抑郁症影响的人群及其疾病程度。这项工作是自我激励的。本文采用先验算法和关联规则挖掘的概念,从大量的相关人员数据库中提取信息。
{"title":"A Model for Prediction of Human Depression Using Apriori Algorithm","authors":"L. Jena, N. K. Kamila","doi":"10.1109/ICIT.2014.65","DOIUrl":"https://doi.org/10.1109/ICIT.2014.65","url":null,"abstract":"Depression a latest epidemic of modern era has always drawn the attention of researcher's to find & evaluate the level, causes & prevention. According to psychiatrists it's not a psychological disorder but it creates the stimulation & simulation of co-ordination failure. The worst case of the leading depression level may contemplates a person to attempt suicide, loss of energy, insomnia etc. This epidemic causes severe personal and public health challenges. Each year thousands of millions of people are suffering from depression and a few receives adequate treatment. Keeping view at the trend of predicting, this paper has been proposed & tried to find out the persons affected by depression and their level of illness. The work is self motivated. Here the concept of apriori algorithm & association rule mining is used in order to extract the information from a large collection of database of concerned persons.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"27 1","pages":"240-244"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90735571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks 基于配对的无线网状网络匿名漫游认证协议
Nazatul Haque Sultan, N. Sarma
In wireless networks, secure authentication protocol should enable a legitimate roaming user to get roaming services from foreign server when he/she is away from home domain. However, a basic authentication protocol requires participation of home server, foreign server and roaming user during the authentication between roaming user and foreign server. Recently, two-party based anonymous authentication protocols have been proposed, which does not require home server's participation, to protect identity, location and route information of the roaming users. But, the available anonymous authentication protocols are not efficient due to the shortcomings in security and high computational cost. This paper addresses those problems and proposes a novel two-party based anonymous authentication protocol for the roaming users, named PAPAR. PAPAR uses pairing-based cryptography to secure and to provide computationally efficient authentication. Further, PAPAR uses pseudo identities to ensure user anonymity. Moreover, PAPAR efficiently mitigates the effect of DoS (Denial of Service) attack by using light computational operations, such as Message Authentication Code. Comparison and experimental results show that PAPAR outperforms the existing works in terms of security and computational cost.
在无线网络中,安全认证协议应使合法漫游用户在远离本地域的情况下能够从国外服务器获得漫游服务。但是,在漫游用户和外部服务器之间进行身份验证时,基本的身份验证协议需要主服务器、外部服务器和漫游用户的参与。近年来,为了保护漫游用户的身份、位置和路由信息,提出了不需要主服务器参与的两方匿名认证协议。但是,现有的匿名认证协议由于安全性不足和计算成本高,效率不高。针对这些问题,本文提出了一种新的基于两方的漫游用户匿名认证协议——PAPAR。PAPAR使用基于配对的加密技术来保证安全性,并提供计算效率高的身份验证。此外,PAPAR使用伪身份来确保用户匿名。此外,PAPAR通过使用消息认证码等轻量级计算操作,有效地减轻了DoS(拒绝服务)攻击的影响。对比和实验结果表明,PAPAR算法在安全性和计算成本方面都优于现有算法。
{"title":"PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks","authors":"Nazatul Haque Sultan, N. Sarma","doi":"10.1109/ICIT.2014.36","DOIUrl":"https://doi.org/10.1109/ICIT.2014.36","url":null,"abstract":"In wireless networks, secure authentication protocol should enable a legitimate roaming user to get roaming services from foreign server when he/she is away from home domain. However, a basic authentication protocol requires participation of home server, foreign server and roaming user during the authentication between roaming user and foreign server. Recently, two-party based anonymous authentication protocols have been proposed, which does not require home server's participation, to protect identity, location and route information of the roaming users. But, the available anonymous authentication protocols are not efficient due to the shortcomings in security and high computational cost. This paper addresses those problems and proposes a novel two-party based anonymous authentication protocol for the roaming users, named PAPAR. PAPAR uses pairing-based cryptography to secure and to provide computationally efficient authentication. Further, PAPAR uses pseudo identities to ensure user anonymity. Moreover, PAPAR efficiently mitigates the effect of DoS (Denial of Service) attack by using light computational operations, such as Message Authentication Code. Comparison and experimental results show that PAPAR outperforms the existing works in terms of security and computational cost.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"155-160"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87931333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Optical Burst Switching in Wavelength Division Multiplexing Networks 波分复用网络中光突发交换的研究进展
Ravi Sankar Barpanda, A. K. Turuk, B. Sahoo
Optical Burst Switching (OBS) is considered as an efficient switching paradigm for building the next generation optical Internet. This review has been motivated by the need for techniques that are capable of supporting the future bandwidth requirement of next-generation applications and services of Internet Protocol (IP) networks. The authors have discussed the basic concepts of OBS paradigm and outlined the signaling and scheduling issues related to OBS networks. Further, a brief summary on the issues that are essential for provisioning Quality-of-Service (QoS) in OBS networks has been outlined. Finally, an analytical model is presented to provide Burst Loss Probability (BLP) guarantees between every pair of source-destination nodes in the network.
光突发交换(OBS)被认为是构建下一代光互联网的一种高效交换模式。对能够支持下一代互联网协议(IP)网络应用和服务的未来带宽需求的技术的需求推动了本次审查。作者讨论了OBS范式的基本概念,概述了与OBS网络相关的信令和调度问题。此外,还简要概述了在OBS网络中提供服务质量(QoS)所必需的问题。最后,提出了一种分析模型来保证网络中每对源-目的节点之间的突发损失概率(BLP)。
{"title":"A Review of Optical Burst Switching in Wavelength Division Multiplexing Networks","authors":"Ravi Sankar Barpanda, A. K. Turuk, B. Sahoo","doi":"10.1109/ICIT.2014.50","DOIUrl":"https://doi.org/10.1109/ICIT.2014.50","url":null,"abstract":"Optical Burst Switching (OBS) is considered as an efficient switching paradigm for building the next generation optical Internet. This review has been motivated by the need for techniques that are capable of supporting the future bandwidth requirement of next-generation applications and services of Internet Protocol (IP) networks. The authors have discussed the basic concepts of OBS paradigm and outlined the signaling and scheduling issues related to OBS networks. Further, a brief summary on the issues that are essential for provisioning Quality-of-Service (QoS) in OBS networks has been outlined. Finally, an analytical model is presented to provide Burst Loss Probability (BLP) guarantees between every pair of source-destination nodes in the network.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"39 1","pages":"142-147"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87002164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Insider Attacks in Cloud Based e-Healthcare Environment 基于云的电子医疗环境中的内部攻击检测
Gaurav Garkoti, S. K. Peddoju, B. Raman
In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote services. Due to its characteristics like on-demand self service, rapid elasticity, ubiquitous network access and resource pooling, it shows high potential for providing e-Healthcare solutions. It can offer various financial and functional benefits to e-Healthcare which includes providing storage flexibility for the rapidly growing healthcare data, reduced cost, better accessibility, improved quality of care and enhancement in medical research. However at the same time, it faces many technical challenges like privacy, reliability, security etc. In the Cloud based ehealthcare environment where the patient's data is transferred between entities, maintaining the security of data becomes a priority. Cryptographic techniques can only provide a secure channel of communication but it fails to provide security at end points. Security attacks may be accomplished by the malicious insider at the end points. A malicious insider may modify the patient's data resulting in a false examination. The paper provides a detective approach for such attacks in the healthcare organizations. Our work is focused with the detection of insider attacks for preventing false examination of patient's health records and assuring the accountability of data usage. Watermarking can be used for detection of modification by an insider attack but does not provide accountability of data usage. Hence our approach combines the functionalities of cryptographic techniques and watermarking together with an accountability framework for providing transparency of patient's data usage.
近年来,由于云计算承诺提供大型存储设施和高度管理的远程服务,因此受到了各种业务和研究组织的极大关注。由于其按需自助服务、快速弹性、无处不在的网络访问和资源池等特点,它显示出提供电子医疗保健解决方案的巨大潜力。它可以为电子医疗保健提供各种财务和功能上的好处,包括为快速增长的医疗保健数据提供存储灵活性、降低成本、更好的可访问性、提高护理质量和增强医学研究。但与此同时,它也面临着隐私、可靠性、安全性等诸多技术挑战。在基于云的电子医疗环境中,患者的数据在实体之间传输,维护数据的安全性成为一个优先事项。加密技术只能提供一个安全的通信通道,但它不能提供端点的安全性。安全攻击可能是由恶意的内部人员在端点完成的。恶意的内部人员可能会修改患者的数据,导致错误的检查。本文为医疗机构中的此类攻击提供了一种检测方法。我们的工作重点是检测内部攻击,以防止对患者健康记录进行虚假检查,并确保数据使用的问责制。水印可用于检测内部攻击的修改,但不提供数据使用的问责制。因此,我们的方法结合了加密技术和水印的功能以及提供患者数据使用透明度的问责框架。
{"title":"Detection of Insider Attacks in Cloud Based e-Healthcare Environment","authors":"Gaurav Garkoti, S. K. Peddoju, B. Raman","doi":"10.1109/ICIT.2014.43","DOIUrl":"https://doi.org/10.1109/ICIT.2014.43","url":null,"abstract":"In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote services. Due to its characteristics like on-demand self service, rapid elasticity, ubiquitous network access and resource pooling, it shows high potential for providing e-Healthcare solutions. It can offer various financial and functional benefits to e-Healthcare which includes providing storage flexibility for the rapidly growing healthcare data, reduced cost, better accessibility, improved quality of care and enhancement in medical research. However at the same time, it faces many technical challenges like privacy, reliability, security etc. In the Cloud based ehealthcare environment where the patient's data is transferred between entities, maintaining the security of data becomes a priority. Cryptographic techniques can only provide a secure channel of communication but it fails to provide security at end points. Security attacks may be accomplished by the malicious insider at the end points. A malicious insider may modify the patient's data resulting in a false examination. The paper provides a detective approach for such attacks in the healthcare organizations. Our work is focused with the detection of insider attacks for preventing false examination of patient's health records and assuring the accountability of data usage. Watermarking can be used for detection of modification by an insider attack but does not provide accountability of data usage. Hence our approach combines the functionalities of cryptographic techniques and watermarking together with an accountability framework for providing transparency of patient's data usage.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"98 1","pages":"195-200"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85773241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
RT-DVS for Power Optimization in Multiprocessor Real-Time Systems 多处理器实时系统中功率优化的RT-DVS
B. Naik, Shirshendu Das, H. Kapoor
Energy saving is extremely important in portable and hand-held devices like laptop and mobile phones. As applications become increasingly sophisticated and processing power increases, the most serious limitation on these devices is the available battery life. One promising technique that provides the best of both low-power and high-performance processors in the real time systems is Dynamic Voltage and Frequency Scaling (DVS). In this paper, we are working on the problem of power optimization for periodic independent real-time tasks that are scheduled over multiprocessors. Theoretically, Real Time tasks are specified with Worst Case Execution Time (WCET). During the operation of the system, the Actual Execution Time (AET) of a task could be a lot smaller than its WCET. We present an Adaptive real time DVS algorithm (Art-DVS) based on AET of tasks. It adapts two state-of-the-art scheduling algorithms Pre-DVS and Post-DVS. Simulation results show that the proposed Art-DVS algorithm performs satisfactorily on energy consumption in comparison to the previous approaches.
对于便携式和手持设备,如笔记本电脑和移动电话,节能是极其重要的。随着应用变得越来越复杂和处理能力的提高,这些设备最严重的限制是可用的电池寿命。动态电压和频率缩放(DVS)是一种在实时系统中提供最佳低功耗和高性能处理器的有前途的技术。在本文中,我们正在研究多处理器调度的周期性独立实时任务的功耗优化问题。理论上,实时任务是用最坏情况执行时间(WCET)来指定的。在系统运行期间,任务的实际执行时间(AET)可能比它的WCET要小得多。提出了一种基于任务AET的自适应实时DVS算法(Art-DVS)。它采用了两种最先进的调度算法:Pre-DVS和Post-DVS。仿真结果表明,与之前的算法相比,本文提出的Art-DVS算法在能量消耗方面具有令人满意的性能。
{"title":"RT-DVS for Power Optimization in Multiprocessor Real-Time Systems","authors":"B. Naik, Shirshendu Das, H. Kapoor","doi":"10.1109/ICIT.2014.59","DOIUrl":"https://doi.org/10.1109/ICIT.2014.59","url":null,"abstract":"Energy saving is extremely important in portable and hand-held devices like laptop and mobile phones. As applications become increasingly sophisticated and processing power increases, the most serious limitation on these devices is the available battery life. One promising technique that provides the best of both low-power and high-performance processors in the real time systems is Dynamic Voltage and Frequency Scaling (DVS). In this paper, we are working on the problem of power optimization for periodic independent real-time tasks that are scheduled over multiprocessors. Theoretically, Real Time tasks are specified with Worst Case Execution Time (WCET). During the operation of the system, the Actual Execution Time (AET) of a task could be a lot smaller than its WCET. We present an Adaptive real time DVS algorithm (Art-DVS) based on AET of tasks. It adapts two state-of-the-art scheduling algorithms Pre-DVS and Post-DVS. Simulation results show that the proposed Art-DVS algorithm performs satisfactorily on energy consumption in comparison to the previous approaches.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"7 1","pages":"24-29"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75853377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 17th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1