به نام خدا
Title: A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
Authors: Ndibanje Bruce, Hoon Jae Lee
Abstract: The interaction between mobile phone and wireless sensor networks has increased these days due to the WSN emergence and its ubiquitous nature. Through cellular network, a user can access gateway of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where a user is strongly verified before accessing the data. The secure authentication proposed protocol provides many security principles to the users for instance user, mutual authentication, and secure session key establishment. Furthermore, security analysis shows .that the proposed protocol possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Publish Year: 2013
Published in: ICACT - IEEE
Number of Pages: 8
موضوع: امنیت شبکه (Network Security) – احراز هویت (Authentication)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Accelerating E-Commerce Sites in the Cloud
Authors: Wei Hao, James Walden, Chris Trenkamp
Abstract: E-commerce web sites typically have large fluctuations in their IT resource usage, while rapid elasticity is an essential characteristic of cloud computing. These characteristics make the cloud a good fit for hosting e-commerce web sites. Cloud providers deploy their cloud in their data centers. However, cloud providers usually have a limited number of data center locations around the world. Thus, e-commerce web sites in the cloud may be far away from their customers. Long client-perceived response latency may cause e-commerce web sites to lose business. To solve this problem, we propose a virtual proxy solution to reduce the response latency of the e-commerce site in the cloud. In our approach, a virtual proxy platform is designed to cache applications and data of e-commerce sites. A k-means based table partitioning algorithm is designed to select frequently used data from the database in the cloud. We have used an industrial e-commerce benchmark TPC-W to evaluate the performance of our approach. The experimental results show that our approach can significantly reduce the client-perceived response time.
Publish Year: 2013
Published in: CCNC – IEEE
موضوع: تجارت الکترونیک (E-Commerce)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
Authors: Devane, S.; Chatterjee, M.; Phatak, D.
Abstract: The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.
Publish Year: 2007
Published by: IAS – IEEE
موضوع: تجارت الکترونیک (Electronic Commerce)
ایران سای – مرجع علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Using the idea of the sparse representation to perform coarse- to-fine face recognition
Authors: Yong Xu , Qi Zhu a , Zizhu Fan , David Zhang d , Jianxun Mi a , Zhihui Lai
Abstract: In this paper, we propose a coarse-to-fine face recognition method. This method consists of two stages and works in a similar way as the well-known sparse representation method. The first stage determines a linear combination of all the training samples that is approximately equal to the test sample. This stage exploits the determined linear combination to coarsely determine candidate class labels of the test sample. The second stage again deter- mines a weighted sum of all the training samples from the candidate classes that is approximately equal to the test sample and uses the weighted sum to perform classification. The rationale of the proposed method is as follows: the first stage identifies the classes that are far from the test sample and removes themfromthe set of the training samples. Then the method will assign the test sample into one of the remaining classes and the classification problem becomes a simpler one with fewer classes. The proposed method not only has a high accuracy but also can be clearly interpreted.
Publish Year: 2013
Published in: Information Sciences - Science Direct
موضوع: شناسایی چهره (Face Detection)
ایران سای – مرجع علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Application of the Mean Field Methods to MRF Optimization in Computer Vision
Authors: Masaki Saito Takayuki Okatani Koichiro Deguchi
Abstract: The mean field (MF) methods are an energy optimization method for Markov random fields (MRFs). These methods, which have their root in solid state physics, estimate the marginal density of each site of an MRF graph by iterative computation, similarly to loopy belief propagation (LBP).It appears that, being shadowed by LBP, the MF methods have not been seriously considered in the computer vision community. This study investigates whether these methods are useful for practical problems, particularly MPM (Maxi-mum Posterior Marginal) inference, in computer vision. To be specific, we apply the naive MF equations and the TAP (Thou less-Anderson-Palmer) equations to interactive segmentation and stereo matching. In this paper, firstly, we show implementation of these methods for computer vision problems. Next, we discuss advantages of the MF methods to LBP. Finally, we present experimental results that the MFmethods are well comparable to LBP in terms of accuracy and global convergence; furthermore, the 3rd-order TAP equation often outperforms LBP in terms of accuracy.
Publish Year: 2012
Published in: CVPR - IEEE
موضوع: بینایی ماشین (Computer Vision)
ایران سای – مرجع علمی فنی مهندسی
حامی دانش بومی ایرانیان