RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Manifold-ranking Based Image Retrieval Using Natural Neighbor

        Qingsheng Zhu,Zhi Chen,Cheng Zhang 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.8

        The manifold-ranking based method is widely used in semi-supervised learning, and its performance is closely related to the structure of the constructed graph. In this paper, we propose a novel graph structure named natural neighbor graph and an algorithm to construct it. We apply the new graph structure into the framework of manifold-ranking based image retrieval. The greatest superiority over k-NN based method is that the free parameter k need not to be explicitly specified any more. We have shown that the manifold ranking algorithm based on our proposed graph structure performs better than k-NN graph. Experiments demonstrate that the proposed algorithm outperforms the state-of-the-art algorithms.

      • KCI등재
      • KCI등재
      • KCI등재

        ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

        Ahmed Mateen,Qingsheng Zhu,Salman Afsar,Akmal Rehan,Imran Mumtaz,Wasi Ahmad 국제문화기술진흥원 2019 International Journal of Advanced Culture Technolo Vol.7 No.4

        The inference for this research was concentrated on client’s data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software’s and hardware’s are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client’s necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client’s info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

      • KCI등재

        RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

        Ahmed Mateen,Qingsheng Zhu,Salman Afsar,Salman Bashir 국제문화기술진흥원 2019 International Journal of Advanced Culture Technolo Vol.7 No.3

        Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

      • KCI등재

        캠퍼스 보안을위한 IoT 및 무선 센서 네트워크 모니터링

        Ahmed Mateen,Qingsheng Zhu,Salman Afsar,Muhammad Usman 한국인터넷방송통신학회 2018 한국인터넷방송통신학회 논문지 Vol.18 No.6

        스마트 캠퍼스의 플랫폼으로 사물 인터넷에 대한 아이디어가 점점 대중화되고 있다. 인터넷에 연결하기 위해 통신네트워크, 센서 노드 및 게이트웨이로 구성된 인프라가 필요하며 각 센서 노드는 환경에서 데이터를 수집할 수 있다. 본 논문은 스마트 캠퍼스 모니터링을 적용하기 위해 인터넷에 구성한 무선 센서 네트워크를 설명한다. 무선 센서 네트워크 모니터링은 저전력 구현 및 통합 시스템을 사용하는 완벽한 솔루션이다. 그러나 제한된 컴퓨팅 범위, 제한된 컴퓨팅 성능, 네트워크프로토콜의 가용성 부족, 프로그래밍 보안 부족 및 기밀성, 무결성 및 가용성 분야의 보안 오류로 인해 수많은 제약이 있다. WSNM 노드를 위한 새로운 보안 기술과 기능이 개발되었다. 보안 네트워크 연구 개발 및 서비스 거부 (DOS) 및 복잡성공격 방지를 위한 시스템을 제안하였다. 이러한 시스템이 제대로 구현되면 사전 할당을 통한 에너지 효율성 메커니즘과 안전한 루틴 알고리즘을 통해 핵심 관리 모델의 새로운 키를 제공 할 수 있다. The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

      • KCI등재

        RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman,Bashir, Salman The International Promotion Agency of Culture Tech 2019 International Journal of Advanced Culture Technolo Vol.7 No.3

        Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

      • KCI등재

        IoT based real time agriculture farming

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.4

        The Internet of things (IOT) is remodeling the agribusiness empowering the agriculturists through the extensive range of strategies, for example, accuracy as well as practical farming to deal with challenges in the field. The paper aims making use of evolving technology i.e. IoT and smart agriculture using automation. The objective of this research paper to present tools and best practices for understanding the role of information and communication technologies in agriculture sector, motivate and make the illiterate farmers to understand the best insights given by the big data analytics using machine learning. The methodology used in this system can monitor the humidity, moisture level and can even detect motions. According to the data received from all the sensors the water pump, cutter and sprayer get automatically activated or deactivated. we investigate a remote monitoring system using Wi-Fi. These nodes send data wirelessly to a central server, which collects the data, stores it and will allow it to be analyzed then displayed as needed and can also be sent to the client mobile.

      • KCI등재

        Record keeping system of bugs for software quality assurance

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.4

        Assistance for the quality assurance management and developers to provide high quality software products. Using a bug record keeping system is exceptionally important in software progress, and it is followed vastly by majority of software producing companies in modern era. Regular application of a bug record keeping system is very helpful in developing software systems. We developed this system which helps the software testing team to keep a complete record of their testing activities during the software testing, also increases your confidence in the software quality, class and worth. Our proposed system offers trouble-free and effortless approaches to acquire desired information about bug, also produces different kinds of reports like summary reports, detailed reports etc. It gives facility to create, delete and update any project. Our developed application system is designed by using visual c# at front end and sql server 2008 management studio express at back end.

      • KCI등재

        ENHANCING PRODUCTIVITY OF CLOUD APPLICATIONS IN CLUSTER COMPUTI NG

        Ahmed Mateen,Qingsheng Zhu,Salman Afsar 국제문화기술진흥원 2019 International Journal of Advanced Culture Technolo Vol.7 No.4

        Cluster computing are more utilized is the fragment of day by day indoctrination life. Imagining variations after incorporating server processors to client server establishment or cluster computing insurances after system, enrolling, Bank process, utility imagining also automatic considering along with an impelled association step. The rapid variations just before the cloud, takes certain fundamental concerns intended for achievement of information structures, records exchanges and material safety. Starting safety problem cloud applications take couple of huge issues for the reasonability of bunch assuming the equipment, gadgets, Encryption programming, firewalls, verification software’s the cloud applications use resources, handling memory and limit are definitely not physically available at customer registering. This will help the customer to affliction recovery. Distributed computing is mostly used worldwide in which the distinctive errands are consigned to a blend of affiliations, programming and organizations that can be gotten over the framework. The cloud applications handle consumer data loads to various appropriated areas where utility, availability and portability are feasible. Our proposed algorithm will reduce the delay factor to allocate the resources by random selection mapping technique among the Cluster based Network which will in future helpful for grid computing performance analysis.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼