首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Modified MIMO-OFDM Channel Estimation Technique for DVB-T2 Systems DVB-T2系统中改进MIMO-OFDM信道估计技术
Mona Z. Saleh, M. Sadek, S. E. El Ramly
This paper proposes an enhanced pilot-aided channel estimation algorithm for the second generation of the digital video broadcast for terrestrial (DVB-T2) standard. Two channel estimation techniques are discussed, the first is based on the 3-points averaging technique, while the second is based on studying the frequency domain pattern of the channel response. The second technique leads to a 0.5 dB reduction in the SNR needed to guarantee a specific bit error rate (BER) requirement when compared to the conventional estimation technique recommended by the DVB-T2 implementation guide lines.
针对第二代地面数字视频广播(DVB-T2)标准,提出了一种增强的导频辅助信道估计算法。讨论了两种信道估计技术,第一种是基于三点平均技术,第二种是基于信道响应频域方向图的研究。与DVB-T2实施指南推荐的传统估计技术相比,第二种技术导致保证特定误码率(BER)要求所需的信噪比降低0.5 dB。
{"title":"Modified MIMO-OFDM Channel Estimation Technique for DVB-T2 Systems","authors":"Mona Z. Saleh, M. Sadek, S. E. El Ramly","doi":"10.1109/CICN.2014.57","DOIUrl":"https://doi.org/10.1109/CICN.2014.57","url":null,"abstract":"This paper proposes an enhanced pilot-aided channel estimation algorithm for the second generation of the digital video broadcast for terrestrial (DVB-T2) standard. Two channel estimation techniques are discussed, the first is based on the 3-points averaging technique, while the second is based on studying the frequency domain pattern of the channel response. The second technique leads to a 0.5 dB reduction in the SNR needed to guarantee a specific bit error rate (BER) requirement when compared to the conventional estimation technique recommended by the DVB-T2 implementation guide lines.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90683852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme 基于Diffie-Hellman的智能卡多服务器认证方案
H. Mittal
A secure smart-card multi-server authentication scheme has been proposed using Diffie-Hellman, Hash-Function and XOR. The scheme made no use of verification table, or encryption techniques, or timestamps to generate a session key to provide secure communication between user and server and resists all possible security attacks, such as Man-in-the-Middle attack, Impersonation attack, Insider attack and many more. The scheme proved to be better when compared to Xie and Chen scheme in terms of security and performance.
提出了一种基于Diffie-Hellman、哈希函数和异或的智能卡多服务器安全认证方案。该方案不使用验证表、加密技术或时间戳来生成会话密钥,以提供用户和服务器之间的安全通信,并抵御所有可能的安全攻击,例如中间人攻击、冒充攻击、内部攻击等等。该方案在安全性和性能方面都优于Xie和Chen方案。
{"title":"Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme","authors":"H. Mittal","doi":"10.1109/CICN.2014.173","DOIUrl":"https://doi.org/10.1109/CICN.2014.173","url":null,"abstract":"A secure smart-card multi-server authentication scheme has been proposed using Diffie-Hellman, Hash-Function and XOR. The scheme made no use of verification table, or encryption techniques, or timestamps to generate a session key to provide secure communication between user and server and resists all possible security attacks, such as Man-in-the-Middle attack, Impersonation attack, Insider attack and many more. The scheme proved to be better when compared to Xie and Chen scheme in terms of security and performance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84932619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Structured Signature Scheme for Efficient Dissemination of Tree Structured Data 树形结构数据有效传播的结构化签名方案
V. Waghmare, R. Thool
The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.
网络正在成为许多组织的主要信息传播手段。Web文档可能具有嵌套的或分层的、相互链接的结构。XML是数据的分层组织。它要求同一文档的不同部分具有不同的机密性和完整性。消费者未被授权访问但属于完整数据集的数据是无关数据。流向消费者的无关数据可能会泄露信息,即使数据是加密的。因此,多方之间的数据共享要求有选择地、安全地传播数据,不泄露任何信息。本文提出了一种利用分层数据模型和组播拓扑的结构特性来解决不同数据表示安全问题,并使数据高效可用的方法。采用发布-订阅系统动态异步构建多播拓扑结构。
{"title":"Structured Signature Scheme for Efficient Dissemination of Tree Structured Data","authors":"V. Waghmare, R. Thool","doi":"10.1109/CICN.2014.186","DOIUrl":"https://doi.org/10.1109/CICN.2014.186","url":null,"abstract":"The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80336406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications 基于遗传算法的无线网络入侵检测研究
Shubhangi Singh, R. S. Kushwah
In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field. Till now, many approaches has been defined by various researchers to improve the detection rate of intrusions over networks. This paper provides a brief study on significance of evolutionary approach genetic algorithm for intrusion detection to classify and detect intrusions. Methodology of genetic algorithm based intrusion detection systems and review on different approaches introduced in the field has been illustrated with the help of flowcharts for easy interpretation. This paper will provide a helpful review to the promising researchers on the relevant topic.
在当今这个技术飞速发展、大量用户的可扩展性不断提高的时代,对安全系统的需求急剧增长。为了保护网络免受未经授权的入侵和黑客的攻击,入侵检测系统提供了对恶意入侵的改进监控,并提供了系统的完整性。这一日益突出的问题促使了特定领域的广泛研究。到目前为止,各种研究人员已经定义了许多方法来提高网络入侵的检测率。本文简要研究了进化方法遗传算法在入侵检测中的意义,对入侵进行分类和检测。基于遗传算法的入侵检测系统的方法,以及对该领域引入的不同方法的回顾,通过流程图进行了说明,以便于解释。本文将为相关领域的研究人员提供一个有益的回顾。
{"title":"A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications","authors":"Shubhangi Singh, R. S. Kushwah","doi":"10.1109/CICN.2014.162","DOIUrl":"https://doi.org/10.1109/CICN.2014.162","url":null,"abstract":"In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field. Till now, many approaches has been defined by various researchers to improve the detection rate of intrusions over networks. This paper provides a brief study on significance of evolutionary approach genetic algorithm for intrusion detection to classify and detect intrusions. Methodology of genetic algorithm based intrusion detection systems and review on different approaches introduced in the field has been illustrated with the help of flowcharts for easy interpretation. This paper will provide a helpful review to the promising researchers on the relevant topic.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78763263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals 基于音频信号的车辆力学状态判定与道路交通密度估计
Minal Bhandarkar, Tejashri Waykole
In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.
在本文中,我们将使用声或声信号来估计车辆交通密度。在这里,我们将估计三种可能的交通状况,即大流量交通(0-10km/h),中等流量(20-40km/h)和自由流量(超过40km/h)交通。累积的声音信号包括来自车辆各部分的各种噪音,包括转动部件、发动机的振动、轮胎与路面的摩擦、车辆的排气部件、齿轮等。噪声信号是轮胎噪声、发动机噪声、发动机空转噪声、偶尔的喇叭声和多辆车的空气湍流噪声。这些噪声信号所包含的频谱内容各不相同,因此可以判断不同的交通密度状态和车辆的力学状况。例如,在自由流动的交通条件下,车辆通常以中高速行驶,因此主要产生轮胎噪声和空气湍流噪声。这里我们将使用支持向量机和人工神经网络分类器。在人工神经网络中,我们将使用前馈网络。
{"title":"Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals","authors":"Minal Bhandarkar, Tejashri Waykole","doi":"10.1109/CICN.2014.94","DOIUrl":"https://doi.org/10.1109/CICN.2014.94","url":null,"abstract":"In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76612167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Genetic Algorithm for Intrusion Detection System 入侵检测系统的改进遗传算法
Dheeraj Pal, A. Parashar
Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.
入侵检测是维护信息完整性的重要安全约束之一。过去已经采用了各种方法,但这些方法对遏制入侵的威胁效果较差。本文的目的是提供一个入侵检测系统(IDS),通过修改遗传算法来实现网络入侵检测系统。由于我们在信息增益的基础上应用了属性子集约简。从而大大降低了训练时间和复杂度。此外,我们在规则生成中嵌入了软计算方法,使规则生成比现有遗传算法中使用的硬计算方法更高效。生成的规则可以更有效地检测攻击。利用KDD'99数据集对该模型进行了验证。实证结果清楚地显示出较高的检出率和较低的假阳性率。
{"title":"Improved Genetic Algorithm for Intrusion Detection System","authors":"Dheeraj Pal, A. Parashar","doi":"10.1109/CICN.2014.178","DOIUrl":"https://doi.org/10.1109/CICN.2014.178","url":null,"abstract":"Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
10-T Full Subtraction Logic Using GDI Technique 使用GDI技术的10-T全减法逻辑
Haramardeep Singh, R. Kumar
Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.
利用CMOS逻辑设计电路是VLSI工程师的一个有前途的领域,但随着设备小型化和便携化的需求,低功耗的新技术正在出现。本文利用门扩散指数(一种低功耗设计的新技术)提出了四种不同的10-T减法逻辑。仿真结果采用Cadence Virtuoso采用180nm技术进行。对所提出的减法逻辑的性能进行了完整的验证,并报道了功耗和延迟最小的电路。使用Cadence Layout XL设计最佳电路的布局设计。
{"title":"10-T Full Subtraction Logic Using GDI Technique","authors":"Haramardeep Singh, R. Kumar","doi":"10.1109/CICN.2014.202","DOIUrl":"https://doi.org/10.1109/CICN.2014.202","url":null,"abstract":"Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73411285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Code Analysis Base Regression Test Selection Technique for D Programming Language 基于代码分析的D语言回归测试选择技术
Nitesh Chouhan, M. Dutta, Mayank Singh
D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.
D语言是一种新的编程语言。这是一种面向对象、命令式、多范式的系统编程语言。在D语言上的回归测试仍未被研究者接触过。我们的研究试图通过引入一种重新验证D程序的技术来弥合这一差距。提出了一种实现D语言回归测试选择和回归测试过程自动化的框架。作为该方法的一部分,特别考虑了对D语言源代码的分析。在我们的方法中,系统依赖图表示将用于回归测试选择,以分析和比较原始程序和修改程序的代码更改。首先,我们从原始程序的源代码构造一个系统依赖图。当在程序中执行某些修改时,将更新构造的图以反映更改。我们的方法除了捕获控制和数据依赖关系外,还表示对象关系产生的依赖关系。在程序模型中执行受影响的模型元素的测试用例被选择用于回归测试。我们进行的实证研究表明,我们的技术选择平均为26.36。与基于UML的技术相比,多了%的故障揭示测试用例,同时在回归测试套件大小上增加了37.34%。
{"title":"A Code Analysis Base Regression Test Selection Technique for D Programming Language","authors":"Nitesh Chouhan, M. Dutta, Mayank Singh","doi":"10.1109/CICN.2014.232","DOIUrl":"https://doi.org/10.1109/CICN.2014.232","url":null,"abstract":"D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation for Medical Information Service Open Platform 医疗信息服务开放平台的设计与实现
Jianfeng Shan, Yu Fang
In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.
在医疗信息服务中,存在着医疗服务资源共享不充分、医疗服务资源开发成本高等问题。本文结合医疗信息服务行业的特点,构建医疗开放平台,向第三方开发者开放其应用或服务,从而有效促进医疗信息资源的共享,降低服务开发成本,促进医疗机构的发展。本文重点研究了医疗信息开放平台的关键技术,以及如何构建医疗信息开放平台。
{"title":"Design and Implementation for Medical Information Service Open Platform","authors":"Jianfeng Shan, Yu Fang","doi":"10.1109/CICN.2014.144","DOIUrl":"https://doi.org/10.1109/CICN.2014.144","url":null,"abstract":"In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75208686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Signcryption Using ECC 使用ECC进行图像签名加密
Reenu Saini, K. S. Vaisla
The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.
由于移动设备的便携性和在世界范围内的广泛应用,人们对移动设备的需求日益增加,但高功耗和高带宽成为一个问题,使其使用起来不方便,这一问题通过提供真实性和保密性的签名加密来解决。签名加密是在单个逻辑步骤中结合加密和数字签名功能的过程。在签名加密的文献中,只有文本数据被签名加密。本文将签名加密的概念扩展到图像数据中,由于从图像中提取信息是一项非常困难的任务,特别是从经过签名加密的图像中提取信息,因此本文采用了图像签名加密技术。
{"title":"Image Signcryption Using ECC","authors":"Reenu Saini, K. S. Vaisla","doi":"10.1109/CICN.2014.177","DOIUrl":"https://doi.org/10.1109/CICN.2014.177","url":null,"abstract":"The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1