By Topic

Date 1-4 July 2013

Filter Results

Displaying Results 1 - 25 of 327
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (301 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): x - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Author index

    Page(s): A-1 - A-5
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • [Back cover]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (283 KB)  
    Freely Available from IEEE
  • Extending the classification scheme of personalization constraints in digital business environments

    Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (489 KB) |  | HTML iconHTML  

    Corporations which operate in digital business environments often implement personalization activities to gain a competitive advantage and raise the buying intentions of their customers. Personalized marketing messages based on individual preferences and needs of customers are the key to success. But companies also need to manage constraints of personalization activities. This contribution focuses on the extension of a classification scheme of personalization constraints by applying a multi case study approach. The classification scheme provides insights into various limitations which need to be handled by companies that aim on the successful implementation of personalization activities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erl-metafeed: Web feeds mashup engine and GUI widget toolkit

    Page(s): 11 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1200 KB) |  | HTML iconHTML  

    In this paper, we present Erl-metafeed, a mashup engine for web feeds and its application as widget toolkit backend system for real-time remixing of web feeds. The emerging real-time web is based on web feeds-streams of real-time information usually implemented using RSS/Atom protocols. Since real-time content is torrential, web users who follow a large number of web feeds usually overwhelm their feed-readers with content they are not able to handle in a reasonable time. The goal of the Erl-metafeed is to provide a platform for scalable management of web feeds in near real-time. The prototype is implemented in Erlang programming language because of its concurrency support and soft real-time execution. Erl-metafeed is programmable using custom query language available via web interface. Additionally, since textual query language is not suitable for end-users, we designed and implemented set of web widgets on top of the Geppeto programming environment. Geppeto environment enables intuitive composition of widgets into powerful mashups, thus circumventing need for learning query language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessing student information systems using mobile connected devices

    Page(s): 18 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (972 KB) |  | HTML iconHTML  

    In the competitive environment of international higher education-related services, the concept of students as “customers” becomes a competitive imperative. Seeing students as “customers” increases a dialogue-based relationship between universities and students having a positive impact on students' satisfaction. And students' satisfaction has a significant positive effect on their loyalty which even can promote their success. In order to increase students' satisfaction with their university, in this paper we propose a mobile application Fer Droid that can be used for data aggregation from different student information systems. Our application saves students' precious time leaving them more time for other activities (e.g. studying, training and dating). We made both subjective (using students' surveys) and objective analyses of Fer Droid and concluded that students are more satisfied and can retrieve information much quicker when using our solution than when using complex web pages on phones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new model of on-line collaborative activity for building ontology in e-learning

    Page(s): 25 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1798 KB) |  | HTML iconHTML  

    In today's world, many real-life processes are either improved by new sophisticated ICT technologies or altered. Collaboration, as a respected method in learning, is such a process. Lately there is ongoing research and a lot of innovations in the area of collaborative learning. In this paper we present a new model of on-line collaborative activity for building ontology. It enriches the list of activities that can be included in the course curriculum, and also, at the end, produces ontology for course domain. We realize an experiment and compare the results obtained by a set of students in this activity with the final course results. The conclusions show that there is a significant correlation between them. Therefore, we recommend this model as a very good activity for collaborative ontology building in the e-learning processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RFID-based system for product authentication

    Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3641 KB) |  | HTML iconHTML  

    This paper aims at presenting a project that joins the efforts to reduce the trade of counterfeit products, by developing an RFID-based integrated system, which would constitute a secure and low cost solution for the authentication of brand products, as well as for monitoring their traceability, building at the same time a software support for the control of distribution along the supply chain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The technique of dynamic binary analysis and its application in the information security sphere

    Page(s): 40 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (538 KB) |  | HTML iconHTML  

    The article describes static and dynamic analysis techniques and its applicability in information security problems such as software protection against unauthorized research. The basic idea of the article is that techniques of dynamic and static analysis must be used in combination with each other to increase the effectiveness of binary code analysis. In the article authors make contributions in binary code decompilation and dynamic execution analysis techniques. The results are applied to the problem of software protection against unauthorized reverse engineering. Authors used analysis of the basic program control flow algorithm to obfuscate the program and protect it against research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hard-Detours: A new technique for dynamic code analysis

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (563 KB) |  | HTML iconHTML  

    Dynamic code analysis for malware detection has become the heart of modern security tools. Some researchers target Microsoft Detours system to perform the dynamic analysis in window environment. This paper reveals some weakness in Microsoft Detours system. It introduces a mechanism (Anti-Detours) to escape from the code analysis trap. The paper proposes a new technique (Hard-Detours) to perform the dynamic code analysis. It intercepts the communication between the application and the system. The interception mechanism depends on the nature of each system call, to avoid detection, removal and bypassing techniques. The proposed technique is implemented for windows 32 Bit Portable Executables. Both analysis techniques are tested over a set of executables with and without the breaking mechanism. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent risk detection and analysis tools for critical infrastructure protection

    Page(s): 52 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1151 KB) |  | HTML iconHTML  

    The protection of the national infrastructures from cyber-attacks is one of the main issues for national and international security. In this article we describe a new European Framework-7 (FP7) funded research project, CockpicCI, and introduce intelligent rick detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable, Information and Communication Technology (ICT), while the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advance intrusion detection and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyber-attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NEAR — Network extractor of anomaly records or traffic split-counting for anomaly detection

    Page(s): 60 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (494 KB) |  | HTML iconHTML  

    The availability of network communications may be affected or even disrupted by malicious actions or by unexpected usage conditions. The good health of systems connected to the network (or lack thereof) may also reflect on network usage patterns. In order to maintain proper functionality for a significantly large network domain, automated or semi-automated methods of anomaly detection are required and several systems have been developed so far. This paper presents NEAR, the feature collection part of such a system, aiming to detect abnormal conditions by collecting relevant traffic features in key points of the network before analyzing them using signal processing methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and visualization of SSH attacks using honeypots

    Page(s): 65 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (774 KB) |  | HTML iconHTML  

    In the field of computer security, honeypots are systems aimed at deceiving malicious users who launch attacks against the servers and network infrastructure of various organizations. They can be deployed as protection mechanisms to an organization's real systems, or as research units to study and analyze the methods employed by individual hackers. In this paper we present the results of a research honeypot's operation, which undertook the role of a web trap for attackers who target the SSH service in order to gain illegal server access. The fake system has remained online and fully operational during a course of several consequent months, capturing attacks and logging all malicious activity. During this assessment it was shown that honeypots remain very effective tools in gathering information about SSH attacks. Furthermore, we observed that attackers are constantly targeting servers in the wild employing ready-to-use tools and dictionaries, while their post-compromise actions include mostly pivoting and IRC-related activities. Lastly we present a visualization tool aimed at helping security researchers during the analysis and conclusions drawing phases, for use with the same SSH honeypot implementation software as outlined in this work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security evaluation of open source clouds

    Page(s): 73 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (574 KB) |  | HTML iconHTML  

    In this paper we analyze most common open source cloud architectures. We installed OpenStack, Eucalyptus, Open-Nebula, and CloudStack and evaluated the security aspects of their architecture and their compliance with security requirements defined by the ISO 27001:2005 standard which specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. Although the analyzed open source cloud solutions offer scalable and flexible platforms for IaaS and provide a lot of security measures, still our research results show security incompliance with several ISO 27001:2005 controls and control objectives that directly depend on cloud software solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity control of HEVC through quadtree depth estimation

    Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (522 KB) |  | HTML iconHTML  

    The emerging HEVC standard introduces a number of tools which increase compression efficiency in comparison to its predecessors at the cost of greater computational complexity. This paper proposes a complexity control method for HEVC encoders based on dynamic adjustment of the newly proposed coding tree structures. The method improves a previous solution by adopting a strategy that takes into consideration both spatial and temporal correlation in order to decide the maximum coding tree depth allowed for each coding tree block. Complexity control capability is increased in comparison to a previous work, while compression losses are decreased by 70%. Experimental results show that the encoder computational complexity can be downscaled to 60% with an average bit rate increase around 1.3% and a PSNR decrease under 0.07 dB. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective reconstruction of low motion regions in distributed video coding

    Page(s): 87 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (649 KB) |  | HTML iconHTML  

    The Distributed Video Coding (DVC) paradigm offers lightweight encoding capabilities which are suitable for devices with limited computational resources. Moreover, DVC techniques can theoretically achieve the same coding efficiency as the traditional video coding schemes which employ more complex encoders. However, the performance of practical DVC architectures is still far from such theoretical bounds, mainly due to the inaccurate Side Information (SI) predicted at the decoder. The work presented in this paper shows that the soft-input values predicted at the decoder may not correctly predict the Wyner-Ziv coefficients, even for regions containing low motion. This generally degrades compression efficiency. To mitigate this, the proposed system predicts the quality of the SI for regions with low motion and then employs a technique which avoids correcting mismatch at locations where the SI and WZ falls within different quantization intervals but the prediction error is within an acceptable range. The experimental results demonstrate that the average Peak Signal-to-Noise Ratio (PSNR) is improved by up to 0.39dB compared to the state-of-the-art DVC architectures, like the DISCOVER codec. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for creating the operational profile of TV/STB device to be used for statistical testing

    Page(s): 93 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    This paper presents a comprehensive analysis of the integration process of statistical methodology for testing the system using tools like MaTeLo in Black-Box Testing system for automated testing. Through the specific example of testing a digital TV receiver, all the steps in testing process are analyzed: creation of device's operational profile (i.e. usage model) with the emphasis on determining the probability of transitions between states, automatic test case generation, test execution, and the analysis of results obtained by the MaTeLo tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic interactive voice response (IVR) platform

    Page(s): 98 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1790 KB) |  | HTML iconHTML  

    Interactive Voice Response (IVR) systems can handle up to 60% of the incoming calls in the call center. Since it promotes self-serving and decreases the number of the agents in the call center, it may lead to improved customer and call center agent satisfaction, increased revenue, and reduced cost. One bottleneck of IVR is that; dynamic nature of services provided by the companies and the needs of various customers necessitate experienced programmers to made changes to IVR, add new modules, scenarios etc. Keeping up with this dynamic environment comes with cost of time and money. In order to prevent this, we have developed a dynamic interactive voice response platform. Proposed system can be used in call centers and enable all kinds of IVR scenarios to be designed, changed, reported, inspected and managed by nonprogrammers. With its dynamic nature, IVR scenarios can be implemented easily, without affecting the underlying computer programming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision fusion methods for automatic modulation classification with multiple sensors in multipath fading channels

    Page(s): 105 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3250 KB) |  | HTML iconHTML  

    Cognitive radio networks (CRN) and wireless sensor networks (WSN) inherently deploy multiple sensors, thus providing an excellent basis for distributed signal sensing and modulation classification. Deploying cooperative multiple sensors offers considerable improvement of automatic modulation classification (AMC) performances, compared to single sensor deployment, especially in the presence of multipath fading. In this paper, different decision fusion methods for AMC with multiple sensors in multipath fading environment were presented and analyzed. Soft decision fusion and joint decision fusion were defined for AMC algorithm using fourth-order cumulants, and comparison with appropriate hard decision fusion methods for same AMC algorithm is performed. Classification performances of derived AMC schemes with fusion of decision, in terms of average probability of correct classification, are investigated and evaluated through Monte-Carlo simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative spectrum sensing in decentralized cognitive radio system

    Page(s): 113 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (543 KB) |  | HTML iconHTML  

    Cooperative spectrum sensing (CSS) is capable to improve the performance of signal detection. It is one solution to overcome fading, shadowing, and uncertainty noises. Unlike centralized networks, Secondary User (SU) in decentralized networks independently senses license channel without forwarding the sensing result to central coordinator. This paper investigates the performance of Decentralized Multiuser CSS (DMCSS) in Cognitive Radio (CS) system. Partially observable Markov decision process (POMDP) is used as an aid for SU to sense and access a license channel. It models spectrum as Markov discrete process where idle and busy states are represented by “0” and “1”. The comparisons are made against Centralized Multiuser Cooperative Spectrum Sensing (CMCSS). The derived results show that CMCSS has better performance than DMCSS model. However, at certain values of SNR, DMCSS performance outperforms the achievable throughput by CMCSS through setting of collision threshold (ζ). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient beamforming in MIMO cognitive radio systems

    Page(s): 119 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1135 KB)  

    In cognitive radio (CR) networks, unlicensed users known as secondary users (SUs) can share the same spectrum with the licensed users known as primary users (PUs) on condition that the SUs interference must not exceed a certain level on PUs. Our target is to provide the SUs with a minimum acceptable quality-of-service (QoS), while keeping the interference to the PUs below a given threshold. However, the problem is not easy in case of MIMO CR systems as the optimization is not convex anymore. In addition, it is not easy to know the channel state information on the links to PUs, thus uncertainty should be considered on PUs links. In this paper, we consider the spectrum sharing multiple input-multiple-output (MIMO) cognitive radio networks, in which multiple primary users (PUs) coexist with multiple secondary users (SUs). We propose a modified iterative solution to calculate optimal transceiver beamforming weights and power levels of the SUs network. Moreover, the realistic situation of uncertainty on PUs links has been studied. The proposed iterative solution is compared in terms of efficiency with another iterative solution. Finally, simulations results are presented to show the effectiveness of the proposed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for spectrum sensing in wideband

    Page(s): 125 - 132
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2804 KB) |  | HTML iconHTML  

    A new algorithm of the spectrum sensing is proposed in this paper. The spectrum sensing methods presented in this paper are optimised to implement these in FPGA based embedded systems. The low power and highly parallelised architecture of FPGA requires low complexity in implementation of separate processing units - spectrum sensors (SpS). The widely used detection methods, based on analysis of signal spectrum energy and standard deviation are integrated in proposed spectrum analysis algorithm for cognitive radio spectrum sensing applications. The experimental investigation of proposed algorithm is performed in simulated and real RF environments. It is showed that proposed algorithm increase the spectrum sensing efficiency and minimise the miss-detection of licensed users to 12 % using only the energy detector in proposed algorithm and 5% additionally adding the standard deviation based spectrum sensing. Three channel verification techniques with proposed spectrum sensors were tested during our investigation. The Forward Consecutive Mean Excision (FCME) based technique showed the highest accuracy in channel verification task. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.