首页 > 最新文献

2016 7th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
ConSec: An encryption policy for context aware security applications ConSec:用于上下文感知安全应用程序的加密策略
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476093
A. Haque, Shantanu Kode, A. Razaque, Muder Almiani
Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, "ConSec", which encrypts and decrypts the memory according the users' usage.
在互联网创建之前,当人们想要保护电子数据不受想要查看、创建、更改和/或销毁电子文件的各个部分的未经授权的代理的攻击时,数据安全是焦点。移动安全仍然处于网络战的前沿,然而,数据安全正在逐步取得进展,可以说是领跑者。由于现在几乎所有设备都连接到网络,数据安全意识一直在急剧上升。这引起了消费者和制造商的严重担忧。目前正在进行研究,以确定检测恶意行为是否正在发生的新方法,如何停止所述行为,以及防止未来恶意行为发生的方法。尽管制造商正在实施行业标准的安全措施,但客户使用起来并不舒服,因为它们并不友好。因此,有必要实现一种安全、智能并能根据客户需求采取行动的安全协议。本文的主要目标不是寻找一种新的加密协议,而是以一种有效的方式实现现有的安全协议,以便客户可以轻松地使用它。本文介绍了一个上下文感知系统“ConSec”,它可以根据用户的使用情况对内存进行加密和解密。
{"title":"ConSec: An encryption policy for context aware security applications","authors":"A. Haque, Shantanu Kode, A. Razaque, Muder Almiani","doi":"10.1109/IACS.2016.7476093","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476093","url":null,"abstract":"Prior to the creation of the internet, data security was the focal point when one wanted to keep electronic data secure from unauthorized agents for whom wanted to view, create, alter, and/or destroy various parts of an electronic file. Mobile security is still at the forefront of cyber warfare however, data security is progressively gaining ground and can arguably be the front runner. Since almost every device is connected to a network nowadays data security awareness has been on a drastic rise. And this has caused both the customers and manufacturers a severe concern. Research has and is currently being conducted to determine new ways to detect if malicious actions are taking place, how to discontinue said actions, and ways to prevent future malicious actions from occurring. Though manufacturers are implementing industry standard security measures, customers are not comfortable using them as they are not user friendly. So it is necessary to implement a security protocol that is well-secure, smart and can act according to the customers' needs. The main goal of this paper is not to find a new encryption protocol rather to implement an existing security protocol in an efficient way, so that customers can easily use it. In this paper we are introducing a context aware system, \"ConSec\", which encrypts and decrypts the memory according the users' usage.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"145 1","pages":"96-101"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86212477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cluster subdivision towards power savings for randomly deployed WSNs — An analysis using 2-D spatial poisson process 随机部署wsn的聚类细分——基于二维空间泊松过程的分析
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476103
Dajin Wang
We propose to use a 2-dimensional (2-D for short) spatial Poisson process to model a WSN with randomly deployed sensors, and use the model to analyze a scheme that subdivides the clusters of a WSN to achieve an overall power savings. We assume no knowledge of how the sensors are spread in the sensing area, and hence need a statistical process to describe the distribution of all sensors. Assuming the 2-D spatial Poisson distribution, a comprehensive analysis is performed to estimate the power savings brought about by the proposed subdivision. Using hexagon as the shape of the cluster, the analysis shows that the subdivision scheme can yield significant savings in overall power consumption of sensors in the cluster.
我们建议使用二维(简称二维)空间泊松过程对随机部署传感器的WSN进行建模,并使用该模型分析一种细分WSN簇的方案,以实现整体节能。我们假设不知道传感器如何在传感区域内分布,因此需要一个统计过程来描述所有传感器的分布。假设二维空间泊松分布,进行了全面的分析,以估计所提出的细分带来的电力节约。采用六边形作为集群形状,分析表明,细分方案可以显著节省集群中传感器的总体功耗。
{"title":"Cluster subdivision towards power savings for randomly deployed WSNs — An analysis using 2-D spatial poisson process","authors":"Dajin Wang","doi":"10.1109/IACS.2016.7476103","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476103","url":null,"abstract":"We propose to use a 2-dimensional (2-D for short) spatial Poisson process to model a WSN with randomly deployed sensors, and use the model to analyze a scheme that subdivides the clusters of a WSN to achieve an overall power savings. We assume no knowledge of how the sensors are spread in the sensing area, and hence need a statistical process to describe the distribution of all sensors. Assuming the 2-D spatial Poisson distribution, a comprehensive analysis is performed to estimate the power savings brought about by the proposed subdivision. Using hexagon as the shape of the cluster, the analysis shows that the subdivision scheme can yield significant savings in overall power consumption of sensors in the cluster.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"39 1","pages":"156-161"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79415779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fletcher-Reeves learning approach for high order MQAM signal modulation recognition 高阶MQAM信号调制识别的Fletcher-Reeves学习方法
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476089
Mohammed Tag Elsir Awad Elsoufi, Xiong Ying, Wang Jun, Tang Bin
A new method of Modulation Recognition of communication signals is proposed based on Clustering Validity Indices. These indices provide a good basis for key feature extraction. To distinguish different modulation schemes, a Fuzzy C-mean (FCM) clustering is used to get the membership matrix of different clusters. Then, a clustering validity measure is applied to extract features. To enhance clustering results at low SNR, a neural network with a conjugate gradient learning algorithm is utilized. Fletcher-Reeves learning approach enhances the recognition rate and widely improves the speed and rate of convergence. Simulation results show the validity of proposed approach compared with other approaches using only clustering or using back propagation neural networks. Misclassification rate is less for low order MQAM signals. This algorithm is applicable in high order MQAM signals. In Non-cooperative Communications, the modulated signal parameters are unknown. Some Modulation Recognition algorithms rely on estimating these parameters first, then applying recognition algorithms. Proposed algorithm doesn't need any prior information to achieve modulation recognition.
提出了一种基于聚类有效性指标的通信信号调制识别新方法。这些指标为关键特征提取提供了良好的基础。为了区分不同的调制方案,采用模糊c均值(FCM)聚类方法得到不同簇的隶属矩阵。然后,采用聚类有效性度量来提取特征。为了提高低信噪比下的聚类效果,采用了一种共轭梯度学习算法的神经网络。弗莱彻-里夫斯学习方法提高了识别率,大大提高了收敛速度和收敛速度。仿真结果表明,与仅使用聚类和使用反向传播神经网络的方法相比,该方法是有效的。低阶MQAM信号的误分类率较低。该算法适用于高阶MQAM信号。在非合作通信中,调制信号的参数是未知的。一些调制识别算法依赖于先估计这些参数,然后再应用识别算法。该算法不需要任何先验信息即可实现调制识别。
{"title":"Fletcher-Reeves learning approach for high order MQAM signal modulation recognition","authors":"Mohammed Tag Elsir Awad Elsoufi, Xiong Ying, Wang Jun, Tang Bin","doi":"10.1109/IACS.2016.7476089","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476089","url":null,"abstract":"A new method of Modulation Recognition of communication signals is proposed based on Clustering Validity Indices. These indices provide a good basis for key feature extraction. To distinguish different modulation schemes, a Fuzzy C-mean (FCM) clustering is used to get the membership matrix of different clusters. Then, a clustering validity measure is applied to extract features. To enhance clustering results at low SNR, a neural network with a conjugate gradient learning algorithm is utilized. Fletcher-Reeves learning approach enhances the recognition rate and widely improves the speed and rate of convergence. Simulation results show the validity of proposed approach compared with other approaches using only clustering or using back propagation neural networks. Misclassification rate is less for low order MQAM signals. This algorithm is applicable in high order MQAM signals. In Non-cooperative Communications, the modulated signal parameters are unknown. Some Modulation Recognition algorithms rely on estimating these parameters first, then applying recognition algorithms. Proposed algorithm doesn't need any prior information to achieve modulation recognition.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"74-79"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85936532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multiple multicast tree optimization solution based on software defined network 一种基于软件定义网络的多组播树优化方案
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476105
Meng Sun, Xinchang Zhang, Lu Wang, Huiling Shi, Wei Zhang
Multiple Multicast Tree (MMT) orchestration optimizes the share of network resources among coexisting MMT. The software defined networking (SDN) technique can conveniently monitor the network traffic and quickly install and change the routes. Based on the SDN environment, considering the dynamic change of the practical network traffic monitored by controller, we model the MMT optimization as a problem with the objective of minimizing the total path length subject to the constraints of bandwidth and MMT's Edge Modification Times (EMT). We propose a two-stage solution to solve the problem. In the first stage, we only consider the optimization objective and the bandwidth constraint to modify the initial MMT and obtain a suboptimal MMT. In the second stage, we continue to modify the suboptimal MMT according to the EMT obtained in the first stage. Experimental results demonstrate that our algorithm have the better performance in terms of the total path length and EMT compared with the existing algorithm of reconstructing a new MMT.
MMT (Multiple Multicast Tree)业务流程优化了共存MMT之间的网络资源共享。软件定义网络(SDN)技术可以方便地监控网络流量,快速地安装和更改路由。基于SDN环境,考虑到控制器监控的实际网络流量的动态变化,我们将MMT优化建模为在带宽和MMT边缘修改时间(EMT)约束下最小化总路径长度的问题。我们建议分两阶段解决这个问题。在第一阶段,我们只考虑优化目标和带宽约束对初始MMT进行修改,得到次优MMT。在第二阶段,我们根据第一阶段获得的EMT继续修改次优MMT。实验结果表明,与现有的重建新MMT的算法相比,我们的算法在总路径长度和EMT方面具有更好的性能。
{"title":"A multiple multicast tree optimization solution based on software defined network","authors":"Meng Sun, Xinchang Zhang, Lu Wang, Huiling Shi, Wei Zhang","doi":"10.1109/IACS.2016.7476105","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476105","url":null,"abstract":"Multiple Multicast Tree (MMT) orchestration optimizes the share of network resources among coexisting MMT. The software defined networking (SDN) technique can conveniently monitor the network traffic and quickly install and change the routes. Based on the SDN environment, considering the dynamic change of the practical network traffic monitored by controller, we model the MMT optimization as a problem with the objective of minimizing the total path length subject to the constraints of bandwidth and MMT's Edge Modification Times (EMT). We propose a two-stage solution to solve the problem. In the first stage, we only consider the optimization objective and the bandwidth constraint to modify the initial MMT and obtain a suboptimal MMT. In the second stage, we continue to modify the suboptimal MMT according to the EMT obtained in the first stage. Experimental results demonstrate that our algorithm have the better performance in terms of the total path length and EMT compared with the existing algorithm of reconstructing a new MMT.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"168-173"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88050068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Arabian E-government websites accessibility: A case study 阿拉伯电子政务网站的可访问性:一个案例研究
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476064
Yahya M. Tashtoush, Ala Darabseh, Huda Al-Sarhan
Nowadays, most people are using the Internet to achieve their daily needs. One of these needs is the ability to access the government websites, to make the necessary transactions and procedures via the internet. Maintaining the transaction over the web arises the needs of building an available and accessible website for all users, even those with special needs. In this paper, we evaluate the accessibility for a set of Arabian E-government websites with two versions, English and Arabic, by using a set of automated tools. The results obtained from the two versions are compared to decide which is the best government website that achieved the least number of errors. The selected accessibility tools are supporting the Web Contents Accessibility Guidelines (WCAG) version 2.0 as an update of the previous version WCAG 1.0.
如今,大多数人都在使用互联网来满足他们的日常需求。其中一项需求是能够访问政府网站,通过互联网进行必要的交易和手续。要在网上进行交易,就需要为所有用户,甚至是那些有特殊需要的用户,建立一个可用和可访问的网站。本文利用一套自动化工具,对一套阿拉伯语和英语两种版本的电子政务网站的可访问性进行了评价。从两个版本得到的结果进行比较,以确定哪一个是最好的政府网站,实现了最少的错误。所选的可访问性工具支持Web内容可访问性指南(WCAG) 2.0版本,作为先前版本WCAG 1.0的更新。
{"title":"The Arabian E-government websites accessibility: A case study","authors":"Yahya M. Tashtoush, Ala Darabseh, Huda Al-Sarhan","doi":"10.1109/IACS.2016.7476064","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476064","url":null,"abstract":"Nowadays, most people are using the Internet to achieve their daily needs. One of these needs is the ability to access the government websites, to make the necessary transactions and procedures via the internet. Maintaining the transaction over the web arises the needs of building an available and accessible website for all users, even those with special needs. In this paper, we evaluate the accessibility for a set of Arabian E-government websites with two versions, English and Arabic, by using a set of automated tools. The results obtained from the two versions are compared to decide which is the best government website that achieved the least number of errors. The selected accessibility tools are supporting the Web Contents Accessibility Guidelines (WCAG) version 2.0 as an update of the previous version WCAG 1.0.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"16 1","pages":"276-281"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88521971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Implementation of parallel model checking for computer-based test security design 实现并行模型校核的计算机化考试安全设计
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476121
Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin bin Ahmadon, S. Yamaguchi, B. Gupta
Computer-based test (CBT for short) has become a new form of delivering test. This causes a challenge of unethical conduct during examinations such as cheating and accessing test data before the examination. Model checking is a promising approach to analyse the behavior and correctness of secured system. However, if a system has a large-scale behavior, we cannot apply model checking because of state space explosion. In this paper, we gave a security considerations of CBT and proposed a Petri net-based framework of parallel model checking with a Petri net splitting procedure. The proposed framework is useful to reduce the size of the net, thereby increases the applicability of model checking to security protocol verification. It allows us to analyse the property of each splitted nets simultaneously. We illustrated the proposed framework with a product called as E-monitoring with biometric authentication scheme as an application example.
基于计算机的考试(简称CBT)已经成为一种新的考试形式。这引发了考试期间不道德行为的挑战,例如作弊和在考试前获取考试数据。模型检查是一种很有前途的分析安全系统行为和正确性的方法。然而,当系统具有大尺度行为时,由于状态空间爆炸的原因,我们无法进行模型检验。在本文中,我们给出了CBT的安全性考虑,并提出了一个基于Petri网的并行模型检查框架。该框架有助于减小网络规模,从而提高模型检查在安全协议验证中的适用性。它使我们能够同时分析每个分裂网的特性。我们以一个称为电子监控的生物识别认证方案作为应用示例来说明所提出的框架。
{"title":"Implementation of parallel model checking for computer-based test security design","authors":"Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin bin Ahmadon, S. Yamaguchi, B. Gupta","doi":"10.1109/IACS.2016.7476121","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476121","url":null,"abstract":"Computer-based test (CBT for short) has become a new form of delivering test. This causes a challenge of unethical conduct during examinations such as cheating and accessing test data before the examination. Model checking is a promising approach to analyse the behavior and correctness of secured system. However, if a system has a large-scale behavior, we cannot apply model checking because of state space explosion. In this paper, we gave a security considerations of CBT and proposed a Petri net-based framework of parallel model checking with a Petri net splitting procedure. The proposed framework is useful to reduce the size of the net, thereby increases the applicability of model checking to security protocol verification. It allows us to analyse the property of each splitted nets simultaneously. We illustrated the proposed framework with a product called as E-monitoring with biometric authentication scheme as an application example.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"28 1","pages":"258-263"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74283791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transmission range adaption technique for non-uniform wireless sensor network topology extraction 非均匀无线传感器网络拓扑提取的传输距离自适应技术
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476104
Walaa Abd Ellatief, O. Younes, Hatem Ahmed, Mohee Hadhoud
Wireless sensor networks are characterized with large number of nodes deployed randomly over the network area. In many real applications, random deployment process produce non-uniform distribution of nodes. This means that there is no constant density over any unit area and therefore no constant number of neighbours for each node. With non-uniform distribution, network appear as if it divided to a set of sub-regions each with a different density level. Density in these sub-regions ranging from high density areas, medium, and others are empty areas. For this reason, topology extraction techniques is needed for sensors which helps to discover the layout of the network around them. It assists to figure the skeleton of the whole network. It can help in the discovery of holes and used to solve this problem as a guide for redeployment process to produce a full covered area. Our aim is to define a simple distributed technique that allow all sensors in the network to share information between them and extract the layout of the network. This is done by defining the closed boundary of sub-regions of different density levels which form the network. Previous techniques used for topology extraction need networks with very high density and deal with special deployment figures. Many of them requires uniform distribution which is not always applicable in real situations. Our proposed technique is simple, use lower density than other previously proposed techniques, and do not need special deployment figures.
无线传感器网络的特点是在网络区域内随机部署大量节点。在许多实际应用中,随机部署过程会导致节点分布不均匀。这意味着在任何单位面积上都没有恒定的密度,因此每个节点的邻居数量也不是恒定的。由于网络的分布不均匀,网络看起来就像被划分成一组不同密度水平的子区域。这些分区的密度从高密度区、中等密度区到其他空区不等。因此,需要对传感器进行拓扑提取技术,以帮助发现其周围网络的布局。它有助于勾勒出整个网络的骨架。它可以帮助发现漏洞,并用于解决此问题,作为重新部署过程的指南,以产生完整的覆盖区域。我们的目标是定义一种简单的分布式技术,允许网络中的所有传感器在它们之间共享信息并提取网络的布局。这是通过定义形成网络的不同密度水平的子区域的封闭边界来实现的。以前用于拓扑提取的技术需要非常高的网络密度和处理特殊的部署图。其中许多要求均匀分布,这在实际情况中并不总是适用。我们提出的技术简单,使用比其他先前提出的技术更低的密度,并且不需要特殊的部署图。
{"title":"Transmission range adaption technique for non-uniform wireless sensor network topology extraction","authors":"Walaa Abd Ellatief, O. Younes, Hatem Ahmed, Mohee Hadhoud","doi":"10.1109/IACS.2016.7476104","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476104","url":null,"abstract":"Wireless sensor networks are characterized with large number of nodes deployed randomly over the network area. In many real applications, random deployment process produce non-uniform distribution of nodes. This means that there is no constant density over any unit area and therefore no constant number of neighbours for each node. With non-uniform distribution, network appear as if it divided to a set of sub-regions each with a different density level. Density in these sub-regions ranging from high density areas, medium, and others are empty areas. For this reason, topology extraction techniques is needed for sensors which helps to discover the layout of the network around them. It assists to figure the skeleton of the whole network. It can help in the discovery of holes and used to solve this problem as a guide for redeployment process to produce a full covered area. Our aim is to define a simple distributed technique that allow all sensors in the network to share information between them and extract the layout of the network. This is done by defining the closed boundary of sub-regions of different density levels which form the network. Previous techniques used for topology extraction need networks with very high density and deal with special deployment figures. Many of them requires uniform distribution which is not always applicable in real situations. Our proposed technique is simple, use lower density than other previously proposed techniques, and do not need special deployment figures.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"17 1","pages":"162-167"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83065505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong multilingual CAPTCHA based on handwritten characters 强大的基于手写字符的多语言验证码
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476118
M. H. Aldosari, Ahmad A. Al-Daraiseh
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a kind of test which is commonly used by different websites on the Internet to differentiate between humans and automated bots. Most websites require the user to pass the CAPTCHA before signing up or filling out most forms. CAPTCHA today is even used on some mobile applications to provide a higher security level that can protect websites and mobile applications against malicious attacks by automated bots and spammers. In this paper, we present an advanced CAPTCHA technique; our technique essentially relies on employing the human recognition ability, which is not available in automated bots or machines, through leveraging the handwriting characteristics in designing CAPTCHA. Moreover, the proposed CAPTCHA technique adopts handwritten characters of four different languages (English, Arabic, Spanish, and French) to generate handwritten multilingual CAPTCHA text using characters from the four adopted languages. Furthermore, the initial experiments' results have shown a promising security level that the proposed CAPTCHA technique can provide.
CAPTCHA(完全自动化的公共图灵测试来区分计算机和人类)是互联网上不同网站常用的一种测试,用于区分人类和自动机器人。大多数网站要求用户在注册或填写大多数表单之前通过验证码。今天,CAPTCHA甚至在一些移动应用程序上使用,以提供更高的安全级别,保护网站和移动应用程序免受自动机器人和垃圾邮件发送者的恶意攻击。在本文中,我们提出了一种先进的验证码技术;我们的技术本质上依赖于利用人类识别能力,这在自动化机器人或机器中是不可用的,通过利用手写特征来设计CAPTCHA。此外,提出的CAPTCHA技术采用四种不同语言(英语、阿拉伯语、西班牙语和法语)的手写字符,使用四种所采用语言的字符生成手写的多语言CAPTCHA文本。此外,最初的实验结果表明,所提出的CAPTCHA技术可以提供一个有希望的安全级别。
{"title":"Strong multilingual CAPTCHA based on handwritten characters","authors":"M. H. Aldosari, Ahmad A. Al-Daraiseh","doi":"10.1109/IACS.2016.7476118","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476118","url":null,"abstract":"CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a kind of test which is commonly used by different websites on the Internet to differentiate between humans and automated bots. Most websites require the user to pass the CAPTCHA before signing up or filling out most forms. CAPTCHA today is even used on some mobile applications to provide a higher security level that can protect websites and mobile applications against malicious attacks by automated bots and spammers. In this paper, we present an advanced CAPTCHA technique; our technique essentially relies on employing the human recognition ability, which is not available in automated bots or machines, through leveraging the handwriting characteristics in designing CAPTCHA. Moreover, the proposed CAPTCHA technique adopts handwritten characters of four different languages (English, Arabic, Spanish, and French) to generate handwritten multilingual CAPTCHA text using characters from the four adopted languages. Furthermore, the initial experiments' results have shown a promising security level that the proposed CAPTCHA technique can provide.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"239-245"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Arabic named entity disambiguation using linked open data 使用链接开放数据的阿拉伯命名实体消歧
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476074
Omar Al-Qawasmeh, Mohammad Al-Smadi, Nisreen Fraihat
This research aims at tackling the problem of Arabic Named-Entity Disambiguation (ANED) through an enhanced approach of information extraction from Arabic Wikipedia and Linked Open Data (LOD). The approach uses query label expansion and text similarity techniques to disambiguate entities of the types: person, location, and organization. A reference dataset for ANED has been prepared and annotated with over 10K entity mentions. The reference dataset was used in evaluating the proposed ANED approach. Results show that the accuracy of ANED approach is 84% on the overall Dataset. Moreover, the proposed approach was capable to disambiguate location entities with accuracy of 94%, person entities with 76%, and organization entities with 78%.
本研究旨在通过从阿拉伯语维基百科和链接开放数据(LOD)中提取信息的增强方法来解决阿拉伯语命名实体消歧(ied)问题。该方法使用查询标签扩展和文本相似技术来消除人员、位置和组织类型实体的歧义。已经准备好了一个参考数据集,并对超过10K个实体进行了注释。使用参考数据集对所提出的方法进行评估。结果表明,该方法在整体数据集上的准确率为84%。此外,该方法能够消除位置实体的歧义,准确率为94%,人员实体为76%,组织实体为78%。
{"title":"Arabic named entity disambiguation using linked open data","authors":"Omar Al-Qawasmeh, Mohammad Al-Smadi, Nisreen Fraihat","doi":"10.1109/IACS.2016.7476074","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476074","url":null,"abstract":"This research aims at tackling the problem of Arabic Named-Entity Disambiguation (ANED) through an enhanced approach of information extraction from Arabic Wikipedia and Linked Open Data (LOD). The approach uses query label expansion and text similarity techniques to disambiguate entities of the types: person, location, and organization. A reference dataset for ANED has been prepared and annotated with over 10K entity mentions. The reference dataset was used in evaluating the proposed ANED approach. Results show that the accuracy of ANED approach is 84% on the overall Dataset. Moreover, the proposed approach was capable to disambiguate location entities with accuracy of 94%, person entities with 76%, and organization entities with 78%.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"333-338"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84251915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An unsupervised method for face photo-sketch synthesis and recognition 一种人脸照片素描合成与识别的无监督方法
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476115
Heba Ghreeb M. Abdel-Aziz, H. M. Ebeid, M. Mostafa
Face recognition is considered one of the most essential applications of Biometrics for personal identification. Face sketch recognition is a special case of face recognition, and it is very important for forensic applications. In this paper, we propose an unsupervised method for face photo-sketch recognition by synthesizing a pseudo-sketch from a single photo. The proposed method is the first unsupervised method that deals with face sketch recognition. The proposed photo-sketch synthesis step consists of two main steps, namely: edge detection and hair detection, which are applied on the grayscale image of the photo image. In the recognition step, the artist sketch is compared with the generated pseudo-sketch. PCA and LDA are used to extract features from the sketch images. The k-nearest neighbor classifier with Euclidean distance is used in the classification step. We use the CUHK database to test the performance of the proposed Method. Results for the synthesized sketches are compared with state-of-the-art methods, e.g., Local Linear Embedding (LLE) and Eigen transformation. The experimental results show that the proposed method generates a clear synthesis sketch and it defines persons more accurate than other methods. Moreover, in the recognition step, the proposed method achieves a recognition rate at the 1-nearest neighbor (rank1: first-match) range from 82% with PCA to 94% with LDA. The highest recognition rate is obtained at the 5-nearest neighbor (rank 5) is 98% that is better than some of the state-of-the-art methods.
人脸识别被认为是生物识别技术在个人身份识别方面最重要的应用之一。人脸素描识别是人脸识别的一种特殊情况,在司法鉴定中具有重要的应用价值。本文提出了一种从单张照片合成伪素描的无监督人脸照片素描识别方法。该方法是第一个处理人脸素描识别的无监督方法。本文提出的照片草图合成步骤包括两个主要步骤,即边缘检测和毛发检测,分别应用于照片图像的灰度图像。在识别步骤中,将艺术家草图与生成的伪草图进行比较。采用PCA和LDA对速写图像进行特征提取。在分类步骤中使用具有欧氏距离的k近邻分类器。我们使用中文大学的数据库来测试该方法的性能。将合成的草图与最先进的方法,如局部线性嵌入(LLE)和特征变换进行了比较。实验结果表明,该方法生成了清晰的综合草图,并且比其他方法更准确地定义了人物。此外,在识别步骤中,该方法在1-最近邻居(rank1: first-match)上的识别率在PCA的82%到LDA的94%之间。在最近的5个邻居(排名5)处获得的最高识别率为98%,比一些最先进的方法要好。
{"title":"An unsupervised method for face photo-sketch synthesis and recognition","authors":"Heba Ghreeb M. Abdel-Aziz, H. M. Ebeid, M. Mostafa","doi":"10.1109/IACS.2016.7476115","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476115","url":null,"abstract":"Face recognition is considered one of the most essential applications of Biometrics for personal identification. Face sketch recognition is a special case of face recognition, and it is very important for forensic applications. In this paper, we propose an unsupervised method for face photo-sketch recognition by synthesizing a pseudo-sketch from a single photo. The proposed method is the first unsupervised method that deals with face sketch recognition. The proposed photo-sketch synthesis step consists of two main steps, namely: edge detection and hair detection, which are applied on the grayscale image of the photo image. In the recognition step, the artist sketch is compared with the generated pseudo-sketch. PCA and LDA are used to extract features from the sketch images. The k-nearest neighbor classifier with Euclidean distance is used in the classification step. We use the CUHK database to test the performance of the proposed Method. Results for the synthesized sketches are compared with state-of-the-art methods, e.g., Local Linear Embedding (LLE) and Eigen transformation. The experimental results show that the proposed method generates a clear synthesis sketch and it defines persons more accurate than other methods. Moreover, in the recognition step, the proposed method achieves a recognition rate at the 1-nearest neighbor (rank1: first-match) range from 82% with PCA to 94% with LDA. The highest recognition rate is obtained at the 5-nearest neighbor (rank 5) is 98% that is better than some of the state-of-the-art methods.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"8 1","pages":"221-226"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82151502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 7th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1