首页 > 最新文献

2019 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems 基于雾计算的关键基础设施系统数据完整性维护
Abdulwahab Alazeb, B. Panda
The evolution of the utilization of technologies in nearly all aspects of life has produced an enormous amount of data essential in a smart city. Therefore, maximizing the benefits of technologies such as cloud computing, fog computing, and the Internet of things is important to manage and manipulate data in smart cities. However, certain types of data are sensitive and risky and may be infiltrated by malicious attacks. As a result, such data may be corrupted, thereby causing concern. The damage inflicted by an attacker on a set of data can spread through an entire database. Valid transactions that have read corrupted data can update other data items based on the values read. In this study, we introduce a unique model that uses fog computing in smart cities to manage utility service companies and consumer data. We also propose a novel technique to assess damage to data caused by an attack. Thus, original data can be recovered, and a database can be returned to its consistent state as no attacking has occurred.
生活中几乎所有方面的技术利用的演变产生了智慧城市必不可少的大量数据。因此,最大限度地发挥云计算、雾计算和物联网等技术的优势,对智慧城市的数据管理和操作至关重要。但是,某些类型的数据是敏感和危险的,可能被恶意攻击渗透。因此,这些数据可能被破坏,从而引起关注。攻击者对一组数据造成的损害可以通过整个数据库传播。读取损坏数据的有效事务可以根据读取的值更新其他数据项。在本研究中,我们引入了一个独特的模型,在智慧城市中使用雾计算来管理公用事业服务公司和消费者数据。我们还提出了一种新的技术来评估攻击对数据造成的损害。因此,可以恢复原始数据,并且可以将数据库恢复到未发生攻击时的一致状态。
{"title":"Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems","authors":"Abdulwahab Alazeb, B. Panda","doi":"10.1109/CSCI49370.2019.00014","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00014","url":null,"abstract":"The evolution of the utilization of technologies in nearly all aspects of life has produced an enormous amount of data essential in a smart city. Therefore, maximizing the benefits of technologies such as cloud computing, fog computing, and the Internet of things is important to manage and manipulate data in smart cities. However, certain types of data are sensitive and risky and may be infiltrated by malicious attacks. As a result, such data may be corrupted, thereby causing concern. The damage inflicted by an attacker on a set of data can spread through an entire database. Valid transactions that have read corrupted data can update other data items based on the values read. In this study, we introduce a unique model that uses fog computing in smart cities to manage utility service companies and consumer data. We also propose a novel technique to assess damage to data caused by an attack. Thus, original data can be recovered, and a database can be returned to its consistent state as no attacking has occurred.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Agnostic Approach for Microservices Autoscaling in Cloud Applications 云应用中微服务自动扩展的不可知方法
Abeer Abdel Khaleq, Ilkyeun Ra
Cloud applications are becoming more containerized in nature. Developing a cloud application based on a microservice architecture imposes different challenges including scalability at the container level. What adds to the challenge is that applications have different QoS requirements and different characteristics requiring a customized scaling approach. In this paper, we present an agnostic approach algorithm for microservices autoscaling deployed on the Google Kubernetes Engine. Our algorithm adapts the Kubernetes autoscaling paradigm based on the application characteristics and resource requirements. Initial testing of the algorithm on different microservices requirements show an enhancement in the microservice response time up to 20% compared to the default autoscaling paradigm.
云应用程序在本质上正变得越来越容器化。基于微服务架构开发云应用程序会带来不同的挑战,包括容器级别的可伸缩性。增加挑战的是,应用程序具有不同的QoS需求和不同的特征,需要定制的缩放方法。在本文中,我们提出了一种部署在谷歌Kubernetes引擎上的微服务自动扩展的不可知方法算法。我们的算法根据应用的特点和资源需求,采用Kubernetes的自动扩展模式。该算法在不同微服务需求上的初步测试表明,与默认的自动扩展范例相比,微服务响应时间提高了20%。
{"title":"Agnostic Approach for Microservices Autoscaling in Cloud Applications","authors":"Abeer Abdel Khaleq, Ilkyeun Ra","doi":"10.1109/CSCI49370.2019.00264","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00264","url":null,"abstract":"Cloud applications are becoming more containerized in nature. Developing a cloud application based on a microservice architecture imposes different challenges including scalability at the container level. What adds to the challenge is that applications have different QoS requirements and different characteristics requiring a customized scaling approach. In this paper, we present an agnostic approach algorithm for microservices autoscaling deployed on the Google Kubernetes Engine. Our algorithm adapts the Kubernetes autoscaling paradigm based on the application characteristics and resource requirements. Initial testing of the algorithm on different microservices requirements show an enhancement in the microservice response time up to 20% compared to the default autoscaling paradigm.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On the Relevance of IT Security in TDL 论TDL中IT安全的相关性
Tobias Eggendorfer, Volker Eiseler
Tactical Data Links (TDL) and Computer Science meet usually when it comes to interoperability andimplementation. However looking at it from an IT security perspective, some interesting issues occur. These become more relevant the more military hard-and software is built using commercial of the shelf (COTS) systems, that are usually implemented using standard Internet technology and software development patterns. This paper looks at Link 16, Link 11 and VMF security considerations and how compatible they are to current IT security standards. Typical security issues are discussed and concepts to mitigate them presented, which however need to be analysed for their suitability to TDL.
战术数据链(TDL)和计算机科学通常在互操作性和实现方面相遇。然而,从it安全的角度来看,会出现一些有趣的问题。使用商用货架(COTS)系统(通常使用标准的Internet技术和软件开发模式实现)构建的军用硬件和软件越多,这些问题就越相关。本文着眼于Link 16、Link 11和VMF的安全考虑,以及它们与当前IT安全标准的兼容性。本文讨论了典型的安全问题,并提出了缓解这些问题的概念,但是需要对它们是否适合TDL进行分析。
{"title":"On the Relevance of IT Security in TDL","authors":"Tobias Eggendorfer, Volker Eiseler","doi":"10.1109/CSCI49370.2019.00044","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00044","url":null,"abstract":"Tactical Data Links (TDL) and Computer Science meet usually when it comes to interoperability andimplementation. However looking at it from an IT security perspective, some interesting issues occur. These become more relevant the more military hard-and software is built using commercial of the shelf (COTS) systems, that are usually implemented using standard Internet technology and software development patterns. This paper looks at Link 16, Link 11 and VMF security considerations and how compatible they are to current IT security standards. Typical security issues are discussed and concepts to mitigate them presented, which however need to be analysed for their suitability to TDL.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality for Big Data Visualization: A Review 面向大数据可视化的增强现实:综述
Ananth N. Ramaseri Chandra, Fatima El Jamiy, H. Reza
Information delivery in a visual format is always a better way of communication. Even with many data visualization techniques available, visualizing enormous amounts of data has always been a challenge. With recent advancements in technology, many new visualization techniques unfold, one of which is visualizing data through Augmented reality(AR). AR and big data have always gone together as AR requires large data sets to render information virtually in a real-time environment, and big data provides the same. In this paper, we explore some of the conventional visualization techniques and discuss the scope and possibilities for AR data visualizations. We also explore the areas implementing the technique of visualizing big data with AR. The advantages and limitations are also discussed.
以视觉形式传递信息总是一种更好的沟通方式。即使有许多可用的数据可视化技术,可视化大量数据始终是一个挑战。随着技术的进步,许多新的可视化技术应运而生,其中之一就是通过增强现实(AR)实现数据可视化。AR和大数据总是相伴而行,因为AR需要大数据集在实时环境中虚拟地呈现信息,而大数据提供了同样的功能。在本文中,我们探讨了一些传统的可视化技术,并讨论了AR数据可视化的范围和可能性。我们还探讨了利用AR实现大数据可视化技术的领域,并讨论了其优势和局限性。
{"title":"Augmented Reality for Big Data Visualization: A Review","authors":"Ananth N. Ramaseri Chandra, Fatima El Jamiy, H. Reza","doi":"10.1109/CSCI49370.2019.00238","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00238","url":null,"abstract":"Information delivery in a visual format is always a better way of communication. Even with many data visualization techniques available, visualizing enormous amounts of data has always been a challenge. With recent advancements in technology, many new visualization techniques unfold, one of which is visualizing data through Augmented reality(AR). AR and big data have always gone together as AR requires large data sets to render information virtually in a real-time environment, and big data provides the same. In this paper, we explore some of the conventional visualization techniques and discuss the scope and possibilities for AR data visualizations. We also explore the areas implementing the technique of visualizing big data with AR. The advantages and limitations are also discussed.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Teaching Cyber Security Topics Effectively in a College or University with Limited Resources 在资源有限的学院或大学有效地教授网络安全主题
C. V. Gonzalez, Gwang Jung
To handle cyber security threats, we need to develop courses to educate students about cyber security concepts, methods to handle various attacks in the cyber space. In this paper, we address what resources would be required to develop courses to effectively teach students the cyber security concepts and methods at small colleges or universities with limited resources.
为了应对网络安全威胁,我们需要开设课程,向学生传授网络安全的概念、处理网络空间各种攻击的方法。在本文中,我们讨论了在资源有限的小型学院或大学开发课程以有效地教授学生网络安全概念和方法所需的资源。
{"title":"Teaching Cyber Security Topics Effectively in a College or University with Limited Resources","authors":"C. V. Gonzalez, Gwang Jung","doi":"10.1109/CSCI49370.2019.00158","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00158","url":null,"abstract":"To handle cyber security threats, we need to develop courses to educate students about cyber security concepts, methods to handle various attacks in the cyber space. In this paper, we address what resources would be required to develop courses to effectively teach students the cyber security concepts and methods at small colleges or universities with limited resources.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Converting Neural Networks to Rule Foam 将神经网络转换为规则泡沫
A. K. Panda, B. Kosko
A system of rules can approximate a trained neural classifier after sampling from that classifier. The rules define a generalized probability mixture that then describes the classifier. The size or granularity of the rule if-parts defines a foam-like structure with a few large rule if-part set bubbles in patternclass centers and many smaller if-part sets near class borders. The rule foam's mixture gives a Bayesian posterior over the rules. The posterior describes the relative importance of each rule for each observed input and output. The foam's mixture also gives the conditional variance that measures the uncertainty in its output. So the rule base is statistically interpretable as well as modular and adaptive. A rule foam with 1000 Gaussian rules approximated a 96.85% accurate MNIST neural classifier and had itself 95.66% classification accuracy. Foams can also approximate other foams. Some approximator foams out-performed the target foam that generated their training data. The rule foam's granularity mitigates the rule explosion inherent in the rule-based approximator's graph-covering structure
规则系统可以在对训练好的神经分类器进行采样后近似该分类器。这些规则定义了一个广义概率混合物,然后用来描述分类器。规则if-parts的大小或粒度定义了一个类似泡沫的结构,其中在patternclass中心有几个较大的规则if-part集气泡,在类边界附近有许多较小的if-part集。规则泡沫的混合物给出了规则的贝叶斯后验。后验描述了每个规则对于每个观察到的输入和输出的相对重要性。泡沫的混合物也给出了衡量其输出不确定性的条件方差。因此,该规则库具有统计可解释性、模块化和自适应性。具有1000条高斯规则的规则泡沫近似于96.85%准确率的MNIST神经分类器,其分类准确率为95.66%。泡沫也可以近似于其他泡沫。一些近似泡沫优于生成训练数据的目标泡沫。规则泡沫的粒度减轻了基于规则的近似器的图覆盖结构中固有的规则爆炸
{"title":"Converting Neural Networks to Rule Foam","authors":"A. K. Panda, B. Kosko","doi":"10.1109/CSCI49370.2019.00100","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00100","url":null,"abstract":"A system of rules can approximate a trained neural classifier after sampling from that classifier. The rules define a generalized probability mixture that then describes the classifier. The size or granularity of the rule if-parts defines a foam-like structure with a few large rule if-part set bubbles in patternclass centers and many smaller if-part sets near class borders. The rule foam's mixture gives a Bayesian posterior over the rules. The posterior describes the relative importance of each rule for each observed input and output. The foam's mixture also gives the conditional variance that measures the uncertainty in its output. So the rule base is statistically interpretable as well as modular and adaptive. A rule foam with 1000 Gaussian rules approximated a 96.85% accurate MNIST neural classifier and had itself 95.66% classification accuracy. Foams can also approximate other foams. Some approximator foams out-performed the target foam that generated their training data. The rule foam's granularity mitigates the rule explosion inherent in the rule-based approximator's graph-covering structure","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SenGen: A Two-Phase Dynamic Simulation and Toolbox of an Indoor Mobile Wireless Sensor Network for Sensor Monitoring and Dataset Generation 用于传感器监测和数据集生成的室内移动无线传感器网络的两相动态仿真和工具箱
Ahlam Mallak, Akash Sonnad, M. Fathi
A Mobile Wireless Sensor Network (MWSN) is a network of mobile sensor nodes that are spatially separated in an open or closed space, which work altogether to sense various system environmental and physical parameters. The state-of-the art is full of approaches for modelling WSNs and MWSNs using different simulation tools and programming languages. Such models require the system expert interference to change the simulated model itself whenever any change is required. Without this interference or having knowledge of the simulated system, these models tend to generate fixed-case sensor data and lack the dynamicity and the ability for further user-specific changes at run-time. In this paper, a two-phase dynamic simulation toolbox -so-called 'SenGen'- is presented and tested, where a full simulation of an indoor MWSN system is established using Simulink. Then a Graphical User Interface (GUI) is created with MATLAB, to overall perform as a dynamic toolbox for sensor data generation in MWSNs.
移动无线传感器网络(MWSN)是一个由移动传感器节点组成的网络,这些节点在空间上分离在一个开放或封闭的空间中,它们共同工作以感知各种系统环境和物理参数。使用不同的仿真工具和编程语言对wsn和mwsn进行建模的最新方法很多。这种模型要求系统专家在需要改变的时候改变模拟模型本身。如果没有这种干扰或不了解模拟系统,这些模型倾向于生成固定情况的传感器数据,并且缺乏动态性和在运行时进一步进行特定于用户的更改的能力。本文提出并测试了两相动态仿真工具箱SenGen,利用Simulink对室内多路无线传感器网络系统进行了全面仿真。然后用MATLAB创建了图形用户界面(GUI),作为MWSNs中传感器数据生成的动态工具箱。
{"title":"SenGen: A Two-Phase Dynamic Simulation and Toolbox of an Indoor Mobile Wireless Sensor Network for Sensor Monitoring and Dataset Generation","authors":"Ahlam Mallak, Akash Sonnad, M. Fathi","doi":"10.1109/CSCI49370.2019.00224","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00224","url":null,"abstract":"A Mobile Wireless Sensor Network (MWSN) is a network of mobile sensor nodes that are spatially separated in an open or closed space, which work altogether to sense various system environmental and physical parameters. The state-of-the art is full of approaches for modelling WSNs and MWSNs using different simulation tools and programming languages. Such models require the system expert interference to change the simulated model itself whenever any change is required. Without this interference or having knowledge of the simulated system, these models tend to generate fixed-case sensor data and lack the dynamicity and the ability for further user-specific changes at run-time. In this paper, a two-phase dynamic simulation toolbox -so-called 'SenGen'- is presented and tested, where a full simulation of an indoor MWSN system is established using Simulink. Then a Graphical User Interface (GUI) is created with MATLAB, to overall perform as a dynamic toolbox for sensor data generation in MWSNs.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Leveraging Business Intelligence to Manage Transactional Data Flows between Private Healthcare Providers and Medical Aid Administrators 利用商业智能管理私人医疗保健提供者和医疗援助管理员之间的事务性数据流的框架
Raksha Pahlad, B. Gatsheni
Leaders at company AB within different functional areas needed to effectively facilitate the integration of BI initiatives into business operations. Semi-structured interviews were used to extract key concepts and attributes relevant to business functional areas, from business leaders and these were related to BI techniques. Thematic analysis on collected data was used to identify critical success factors (CSFs). A conceptual framework was developed which comprises business CSFs that are related to opportunities for value derivation from BI activities. This framework can be used as a guideline by Company AB for opportunity assessment and BI implementation, thereby enabling Company AB to leverage the value of BI. A decision tree predictive analytics model whose business rules potentially assist in proactive churn management for companies that have customer transaction volumes as a feature, was developed. This analytics model shows that claims that are not submitted to a client's historically most frequently used medical aids and variances in transactional claim volumes of more than 20%, are good indicators of a client churn. Companies that provide value to the private healthcare industry via the facilitation and management of transactional data flows between healthcare providers and medical aid administrators will benefit from the insights derived from this model.
AB公司不同职能领域的领导需要有效地促进将BI计划集成到业务运营中。半结构化访谈用于从业务领导者那里提取与业务功能领域相关的关键概念和属性,这些概念和属性与BI技术相关。对收集到的数据进行专题分析,以确定关键成功因素。开发了一个概念框架,其中包括与BI活动的价值派生机会相关的业务csf。这个框架可以被公司AB用作机会评估和BI实现的指导方针,从而使公司AB能够利用BI的价值。开发了一个决策树预测分析模型,其业务规则可能有助于以客户交易量为特征的公司进行主动流失管理。该分析模型显示,未提交给客户历史上最常用的医疗辅助设备的索赔,以及交易索赔量的差异超过20%,都是客户流失的良好指标。通过促进和管理医疗保健提供者和医疗援助管理员之间的交易数据流,为私人医疗保健行业提供价值的公司将受益于该模型的见解。
{"title":"A Framework for Leveraging Business Intelligence to Manage Transactional Data Flows between Private Healthcare Providers and Medical Aid Administrators","authors":"Raksha Pahlad, B. Gatsheni","doi":"10.1109/CSCI49370.2019.00185","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00185","url":null,"abstract":"Leaders at company AB within different functional areas needed to effectively facilitate the integration of BI initiatives into business operations. Semi-structured interviews were used to extract key concepts and attributes relevant to business functional areas, from business leaders and these were related to BI techniques. Thematic analysis on collected data was used to identify critical success factors (CSFs). A conceptual framework was developed which comprises business CSFs that are related to opportunities for value derivation from BI activities. This framework can be used as a guideline by Company AB for opportunity assessment and BI implementation, thereby enabling Company AB to leverage the value of BI. A decision tree predictive analytics model whose business rules potentially assist in proactive churn management for companies that have customer transaction volumes as a feature, was developed. This analytics model shows that claims that are not submitted to a client's historically most frequently used medical aids and variances in transactional claim volumes of more than 20%, are good indicators of a client churn. Companies that provide value to the private healthcare industry via the facilitation and management of transactional data flows between healthcare providers and medical aid administrators will benefit from the insights derived from this model.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle Collision Avoidance System Using Localization Algorithm and Predictive Analysis 基于定位算法和预测分析的汽车避碰系统
Samuel Ndueso John, Etinosa Noma-Osaghae, K. Okokpujie, Chinonso Okereke, Joshua Ananaba, O. Omoruyi
Road crashes account for over a million deaths around the world every year. It is one of the leading causes of death for young people between the ages of fifteen and twenty-nine. Road accidents cause a whooping loss of up to three percent of the many nations' Gross Domestic Product (GDP) and ninety percent of these accidents occur in low to middle income countries with a sizable fifty-four percent share of the world's vehicular population. One of the Sustainable Development Goals (SDGs) is the reduction of road accidents around the world by half of its current value by 2020. This goal becomes a hit if low to medium-income nations get safer roads. This paper proposes a collision avoidance system that provides drivers with an automated preemptive response to impending car accidents with the aid of distance predictive analysis via sensors connected to the braking system of the vehicle, which in turn slows down the speed of the vehicle or completely stops it from moving altogether. The proposed collision avoidance system makes use of ultrasonic sensors and a unique localization algorithm to deliver a largely user-based vehicular protection from collision.
世界各地每年有一百多万人死于道路交通事故。它是15至29岁年轻人死亡的主要原因之一。道路交通事故造成的损失高达许多国家国内生产总值(GDP)的3%,其中90%发生在低收入和中等收入国家,这些国家占世界机动车人口的54%。可持续发展目标之一是到2020年将世界各地的道路交通事故数量减少一半。如果中低收入国家的道路更加安全,这个目标就会实现。本文提出了一种碰撞避免系统,该系统通过连接到车辆制动系统的传感器进行距离预测分析,为驾驶员提供对即将发生的车祸的自动先发制人的响应,从而降低车辆的速度或完全停止行驶。所提出的避碰系统利用超声波传感器和独特的定位算法来提供基于用户的车辆避碰保护。
{"title":"Vehicle Collision Avoidance System Using Localization Algorithm and Predictive Analysis","authors":"Samuel Ndueso John, Etinosa Noma-Osaghae, K. Okokpujie, Chinonso Okereke, Joshua Ananaba, O. Omoruyi","doi":"10.1109/CSCI49370.2019.00141","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00141","url":null,"abstract":"Road crashes account for over a million deaths around the world every year. It is one of the leading causes of death for young people between the ages of fifteen and twenty-nine. Road accidents cause a whooping loss of up to three percent of the many nations' Gross Domestic Product (GDP) and ninety percent of these accidents occur in low to middle income countries with a sizable fifty-four percent share of the world's vehicular population. One of the Sustainable Development Goals (SDGs) is the reduction of road accidents around the world by half of its current value by 2020. This goal becomes a hit if low to medium-income nations get safer roads. This paper proposes a collision avoidance system that provides drivers with an automated preemptive response to impending car accidents with the aid of distance predictive analysis via sensors connected to the braking system of the vehicle, which in turn slows down the speed of the vehicle or completely stops it from moving altogether. The proposed collision avoidance system makes use of ultrasonic sensors and a unique localization algorithm to deliver a largely user-based vehicular protection from collision.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PAVSS: Privacy Assessment Vulnerability Scoring System 隐私评估漏洞评分系统
Zackary Foreman, Thomas Bekman, T. Augustine, H. Jafarian
Currently, the guidelines for business entities to collect and use consumer information from online sources is guided by the Fair Information Practice Principles set forth by the Federal Trade Commission in the United States. These guidelines are inadequate, outdated, and provide little protection for consumers. Moreover, there are many techniques to anonymize the stored data that was collected by large companies and governments. However, what does not exist is a framework that is capable of evaluating and scoring the effects of this information in the event of a data breach. In this work, a framework for scoring and evaluating the vulnerability of private data is presented. This framework is created to be used in parallel with currently adopted frameworks that are used to score and evaluate other areas of deficiencies within the software, including CVSS and CWSS. It is dubbed the Privacy Assessment Vulnerability Scoring System (PAVSS) and quantifies the privacy-breach vulnerability an individual takes on when using an online platform. This framework is based on a set of hypotheses about user behavior, inherent properties of an online platform, and the usefulness of available data in performing a cyber attack. The weight each of these metrics has within our model is determined by surveying cybersecurity experts. Finally, we test the validity of our user-behavior based hypotheses, and indirectly our model by analyzing user posts from a large twitter data set.
目前,商业实体从网上收集和使用消费者信息的指导方针是由美国联邦贸易委员会制定的公平信息实践原则指导的。这些指导方针是不充分的,过时的,对消费者提供的保护很少。此外,有许多技术可以将大公司和政府收集的存储数据匿名化。然而,目前尚不存在能够在数据泄露事件中对这些信息的影响进行评估和评分的框架。在这项工作中,提出了一个私有数据脆弱性评分和评估框架。创建此框架是为了与当前采用的框架并行使用,这些框架用于对软件中的其他缺陷进行评分和评估,包括CVSS和CWSS。它被称为隐私评估漏洞评分系统(PAVSS),量化个人在使用在线平台时面临的隐私泄露漏洞。该框架基于一组关于用户行为、在线平台的固有属性以及执行网络攻击时可用数据的有用性的假设。这些指标在我们模型中的权重是通过调查网络安全专家来确定的。最后,我们测试了基于用户行为的假设的有效性,并通过分析来自大型twitter数据集的用户帖子间接测试了我们的模型。
{"title":"PAVSS: Privacy Assessment Vulnerability Scoring System","authors":"Zackary Foreman, Thomas Bekman, T. Augustine, H. Jafarian","doi":"10.1109/CSCI49370.2019.00034","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00034","url":null,"abstract":"Currently, the guidelines for business entities to collect and use consumer information from online sources is guided by the Fair Information Practice Principles set forth by the Federal Trade Commission in the United States. These guidelines are inadequate, outdated, and provide little protection for consumers. Moreover, there are many techniques to anonymize the stored data that was collected by large companies and governments. However, what does not exist is a framework that is capable of evaluating and scoring the effects of this information in the event of a data breach. In this work, a framework for scoring and evaluating the vulnerability of private data is presented. This framework is created to be used in parallel with currently adopted frameworks that are used to score and evaluate other areas of deficiencies within the software, including CVSS and CWSS. It is dubbed the Privacy Assessment Vulnerability Scoring System (PAVSS) and quantifies the privacy-breach vulnerability an individual takes on when using an online platform. This framework is based on a set of hypotheses about user behavior, inherent properties of an online platform, and the usefulness of available data in performing a cyber attack. The weight each of these metrics has within our model is determined by surveying cybersecurity experts. Finally, we test the validity of our user-behavior based hypotheses, and indirectly our model by analyzing user posts from a large twitter data set.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1