Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650316
S. K. Roy, D. Ghosh, R. Pal, B. Chaudhuri
The texture classification is a significant problem in the area of pattern recognition. This work proposes a novel Affine Differential Local Mean ZigZag Pattern (ADLMZP) descriptor for texture classification. The proposed method has two manifolds: first Local Mean ZigZag Pattern (LMZP) map is calculated by thresholding the 3 × 3 patch neighbor intensity values with respect to path mean but in a ZigZag weighting fashion, which provides a well discriminated descriptor compared to other local binary descriptors. The local micropattern is obtained by comparing neighbor intensity values with respect to path mean which makes the descriptor robust against noise and illumination variations. Secondly, in order to make it invariant to affine changes, we incorporated an affine differential transformation along with affine gradient magnitude information of a texture image which is differed from Euclidean Gradient. The final ADLMZP descriptor is generated by concatenating the histograms of all Affine Differential Local Mean ZigZag maps. The results are computed over well known KTH-TIPS, Brodatz, and CUReT texture datasets and compared with the state-of-the-art texture classification methods.
纹理分类是模式识别领域的一个重要问题。本文提出了一种新的仿射微分局部平均之字形(ADLMZP)纹理分类描述符。所提出的方法有两个流形:第一个LMZP (Local Mean ZigZag Pattern)映射是通过相对于路径均值的3 × 3 patch邻居强度值的阈值来计算的,但采用ZigZag加权方式,与其他局部二进制描述符相比,它提供了一个很好的区分描述符。局部微图是通过比较相邻强度值相对于路径均值得到的,这使得描述子对噪声和光照变化具有鲁棒性。其次,为了使其不受仿射变化的影响,我们将纹理图像的仿射微分变换与仿射梯度的大小信息结合起来,这与欧几里得梯度不同;最终的ADLMZP描述符是通过连接所有仿射微分局部平均之字形图的直方图生成的。结果在已知的KTH-TIPS、Brodatz和CUReT纹理数据集上进行计算,并与最先进的纹理分类方法进行比较。
{"title":"Affine Differential Local Mean ZigZag Pattern for Texture Classification","authors":"S. K. Roy, D. Ghosh, R. Pal, B. Chaudhuri","doi":"10.1109/TENCON.2018.8650316","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650316","url":null,"abstract":"The texture classification is a significant problem in the area of pattern recognition. This work proposes a novel Affine Differential Local Mean ZigZag Pattern (ADLMZP) descriptor for texture classification. The proposed method has two manifolds: first Local Mean ZigZag Pattern (LMZP) map is calculated by thresholding the 3 × 3 patch neighbor intensity values with respect to path mean but in a ZigZag weighting fashion, which provides a well discriminated descriptor compared to other local binary descriptors. The local micropattern is obtained by comparing neighbor intensity values with respect to path mean which makes the descriptor robust against noise and illumination variations. Secondly, in order to make it invariant to affine changes, we incorporated an affine differential transformation along with affine gradient magnitude information of a texture image which is differed from Euclidean Gradient. The final ADLMZP descriptor is generated by concatenating the histograms of all Affine Differential Local Mean ZigZag maps. The results are computed over well known KTH-TIPS, Brodatz, and CUReT texture datasets and compared with the state-of-the-art texture classification methods.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650229
Ummu Raihan Yussuf, J. Johari, Muhammad Erfan Elias, N. E. Abdullah
This paper is focuses on designing and constructing hardware to measure inductivity for discriminating White Root Disease (WRD) from Dry Rubber Content (DRC) sheets. Five types of clones, which are RRIM 3001, RRIM 2008, RRIM 2007, RRIM 2014 and RRIM 2002 were used for this research. The crude inductive sensor used as an inductor with value of 470µH and act as an actual value measurement. The variation of 470µH inductor determines the changes of inductivity from the magnetic field produce by the inductor to the material. The hardware also consists of Arduino microcontroller-based programmed with a formula for inductance value measurement. The device tested at a specific workspace in order to keep the measurement correctly tested. For the discrimination process of data, the data undergoes the normality distribution test using the SPSS software. The analysis disclosed that the data were not normally distributed with a significant level at 0.00. Therefore, the Non-Parametric test which is Kruskal-Wallis test need to be used. Thus, the final finding showed that there is a significant evidence for discriminating the WRD.
{"title":"Inference Analysis of Dry Rubber Content Inductive Properties in Discriminating of White Root Disease","authors":"Ummu Raihan Yussuf, J. Johari, Muhammad Erfan Elias, N. E. Abdullah","doi":"10.1109/TENCON.2018.8650229","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650229","url":null,"abstract":"This paper is focuses on designing and constructing hardware to measure inductivity for discriminating White Root Disease (WRD) from Dry Rubber Content (DRC) sheets. Five types of clones, which are RRIM 3001, RRIM 2008, RRIM 2007, RRIM 2014 and RRIM 2002 were used for this research. The crude inductive sensor used as an inductor with value of 470µH and act as an actual value measurement. The variation of 470µH inductor determines the changes of inductivity from the magnetic field produce by the inductor to the material. The hardware also consists of Arduino microcontroller-based programmed with a formula for inductance value measurement. The device tested at a specific workspace in order to keep the measurement correctly tested. For the discrimination process of data, the data undergoes the normality distribution test using the SPSS software. The analysis disclosed that the data were not normally distributed with a significant level at 0.00. Therefore, the Non-Parametric test which is Kruskal-Wallis test need to be used. Thus, the final finding showed that there is a significant evidence for discriminating the WRD.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650396
Erwin B. Daculan
In May 2003, the United Nations Educational, Scientific and Cultural Organization (UNESCO) through its World Commission on the Ethics of Scientific Knowledge and Technology identified seven factors in the rising interest on ethics. The same document identified five partial aims of teaching ethics. Recommendations on what topics are to be covered and how assessment and evaluation are to be done were also mentioned in the document. It was with these insights that the revised course on ethics and laws for undergraduate fifth-year electronics engineering students was designed along outcomes-based teaching and learning approach. This paper presents the results of a course development on engineering ethics and laws by a non-expert/ethicist. Students professed the ethics they will adhere to in the practice of their profession and in their personal lives. They animated the content and intent of their personal and professional code of ethics and related principles and laws through course-specified assessment. Finally, they planned their way of life to achieve areté (excellence) in the light of Carolinian ideals of scientia, virtus, and devotio. The interventions used to assess whether the intended outcomes have been achieved are presented and described in detail. An evaluation questionnaire was distributed at the end of the semester to seek out the change in attitude toward a code of ethics and the interpretation of interventions as to the outcome being assessed. The collated result showed some unexpected items in the interpretation of the outcomes being assessed in a particular intervention and positive improvement of personal inclination to deliberate a decision on ethical issues in the light of Carolinian vision.
{"title":"Teaching Engineering Ethics and Laws in the Light of the Carolinian Vision","authors":"Erwin B. Daculan","doi":"10.1109/TENCON.2018.8650396","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650396","url":null,"abstract":"In May 2003, the United Nations Educational, Scientific and Cultural Organization (UNESCO) through its World Commission on the Ethics of Scientific Knowledge and Technology identified seven factors in the rising interest on ethics. The same document identified five partial aims of teaching ethics. Recommendations on what topics are to be covered and how assessment and evaluation are to be done were also mentioned in the document. It was with these insights that the revised course on ethics and laws for undergraduate fifth-year electronics engineering students was designed along outcomes-based teaching and learning approach. This paper presents the results of a course development on engineering ethics and laws by a non-expert/ethicist. Students professed the ethics they will adhere to in the practice of their profession and in their personal lives. They animated the content and intent of their personal and professional code of ethics and related principles and laws through course-specified assessment. Finally, they planned their way of life to achieve areté (excellence) in the light of Carolinian ideals of scientia, virtus, and devotio. The interventions used to assess whether the intended outcomes have been achieved are presented and described in detail. An evaluation questionnaire was distributed at the end of the semester to seek out the change in attitude toward a code of ethics and the interpretation of interventions as to the outcome being assessed. The collated result showed some unexpected items in the interpretation of the outcomes being assessed in a particular intervention and positive improvement of personal inclination to deliberate a decision on ethical issues in the light of Carolinian vision.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ability to offer remote access to services or data through various platforms has become a public expectation of many applications and systems nowadays. Recently, we can see the growth in trend where wide range of service providers offer the option to use biometric as a form of authentication, replacing conventional password system. While we gradually migrate towards such authentication method, it is important not to overlook the vulnerabilities of such systems to spoof attack. In fact, spoof attack must be prevented as a mandatory prerequisite in all biometric systems. In this paper, we present a systematic approach for face authentication that incorporates state-of-the-art liveness detection and face verification algorithms to safeguard a system against such attack. We explore and examine the feasibility of the application of such approach on generic devices and systems without incurring hardware dependencies or requiring extensive user-cooperation.
{"title":"Towards Building a Remote Anti-spoofing Face Authentication System","authors":"Chien Eao Lee, Lilei Zheng, Ying Zhang, V. Thing, Ying Yu Chu","doi":"10.1109/TENCON.2018.8650440","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650440","url":null,"abstract":"The ability to offer remote access to services or data through various platforms has become a public expectation of many applications and systems nowadays. Recently, we can see the growth in trend where wide range of service providers offer the option to use biometric as a form of authentication, replacing conventional password system. While we gradually migrate towards such authentication method, it is important not to overlook the vulnerabilities of such systems to spoof attack. In fact, spoof attack must be prevented as a mandatory prerequisite in all biometric systems. In this paper, we present a systematic approach for face authentication that incorporates state-of-the-art liveness detection and face verification algorithms to safeguard a system against such attack. We explore and examine the feasibility of the application of such approach on generic devices and systems without incurring hardware dependencies or requiring extensive user-cooperation.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650529
Daesung Yu, Junbeom Kim, Seung‐Eun Hong, Seok-Hwan Park
This work proposes an energy-efficient design of transmit power control and relaying strategies for the uplink of a cloud radio access network (C-RAN) with wireless fronthaul link. In the system, a set of single-antenna user equipments (UEs) send independent messages to a multi-antenna baseband processing unit (BBU) through a set of parallel multi-antenna remote radio heads (RRHs). The radio access link from the UEs to the RRHs is assumed to be orthogonal to the fronthaul link from the RRHs to the BBU. Since the overall performance of the system may be limited by the battery constraints of the UEs, this work tackles the problem of maximizing the worst energy efficiency of the UEs subject to the transmit power constraints at the UEs and the RRHs. Numerical results are provided to validate the advantages of the proposed energy-efficient scheme.
{"title":"Energy Efficient Power Control and Relaying for C-RAN Uplink With Wireless Fronthaul","authors":"Daesung Yu, Junbeom Kim, Seung‐Eun Hong, Seok-Hwan Park","doi":"10.1109/TENCON.2018.8650529","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650529","url":null,"abstract":"This work proposes an energy-efficient design of transmit power control and relaying strategies for the uplink of a cloud radio access network (C-RAN) with wireless fronthaul link. In the system, a set of single-antenna user equipments (UEs) send independent messages to a multi-antenna baseband processing unit (BBU) through a set of parallel multi-antenna remote radio heads (RRHs). The radio access link from the UEs to the RRHs is assumed to be orthogonal to the fronthaul link from the RRHs to the BBU. Since the overall performance of the system may be limited by the battery constraints of the UEs, this work tackles the problem of maximizing the worst energy efficiency of the UEs subject to the transmit power constraints at the UEs and the RRHs. Numerical results are provided to validate the advantages of the proposed energy-efficient scheme.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120936639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650245
M. S. Zaman, R. Haider, S. Bukhari, Chul-Hwan Kim
The frequency deviation of a system from its nominal value is a significant indicator of the system’s stability. This issue is further highlighted when the system is incorporated with intermittent renewable energy resources. In this work, frequency regulation of a microgrid is achieved by aggregated demand response. The proposed aggregator is implemented in a central controller that controls frequency deviation by manipulating responsive loads. In case of higher frequency deviation, an adaptive control action which is proportional to the magnitude of frequency deviation manipulates a large number of responsive loads to quickly restore the frequency to its nominal range. The amount of manipulated responsive load is reduced by another section of the central controller which deals with minor frequency deviations as well. The proposed control scheme is implemented on a test system and obtained results verify the desired functionality of aggregated demand response controller.
{"title":"Frequency Profile Improvement of a Microgrid through Aggregated Demand Response","authors":"M. S. Zaman, R. Haider, S. Bukhari, Chul-Hwan Kim","doi":"10.1109/TENCON.2018.8650245","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650245","url":null,"abstract":"The frequency deviation of a system from its nominal value is a significant indicator of the system’s stability. This issue is further highlighted when the system is incorporated with intermittent renewable energy resources. In this work, frequency regulation of a microgrid is achieved by aggregated demand response. The proposed aggregator is implemented in a central controller that controls frequency deviation by manipulating responsive loads. In case of higher frequency deviation, an adaptive control action which is proportional to the magnitude of frequency deviation manipulates a large number of responsive loads to quickly restore the frequency to its nominal range. The amount of manipulated responsive load is reduced by another section of the central controller which deals with minor frequency deviations as well. The proposed control scheme is implemented on a test system and obtained results verify the desired functionality of aggregated demand response controller.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"34 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113944587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650314
Y. Goh, C. Ng, Y. Lee, C. Teoh, Y. Goh
The study of the observable characteristics of mutants of the same genotype plant interacting with various environmental conditions is important to understand how well the performance of a particular trait in different growth environment. By automating the plant mutant classification process, botanist and agriculture scientist can perform large scale experiments to cultivate plants with useful traits to combat extreme environment conditions. This research aims to construct an optimum convolutional neural network (CNN) for image-based plant mutant classification task. Optimum parameters for 1) number of convolutional layers, 2) number of neurons in fully connected (FC) layer and 3) Number of FC layers are found in this paper. The possibility to improve success classification rate was explored by applying image pre-processing methods. Experimental results show that under optimum condition, CNN classification system without pre-processing algorithm shows the best success recognition rate of 97.90%.
{"title":"Optimum CNN-Based Plant Mutant Classification","authors":"Y. Goh, C. Ng, Y. Lee, C. Teoh, Y. Goh","doi":"10.1109/TENCON.2018.8650314","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650314","url":null,"abstract":"The study of the observable characteristics of mutants of the same genotype plant interacting with various environmental conditions is important to understand how well the performance of a particular trait in different growth environment. By automating the plant mutant classification process, botanist and agriculture scientist can perform large scale experiments to cultivate plants with useful traits to combat extreme environment conditions. This research aims to construct an optimum convolutional neural network (CNN) for image-based plant mutant classification task. Optimum parameters for 1) number of convolutional layers, 2) number of neurons in fully connected (FC) layer and 3) Number of FC layers are found in this paper. The possibility to improve success classification rate was explored by applying image pre-processing methods. Experimental results show that under optimum condition, CNN classification system without pre-processing algorithm shows the best success recognition rate of 97.90%.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121746628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650204
Harshit Gupta, Priyal Gupta, Praveen Kumar, Atul Gupta, P. K. Mathur
This paper presents a realistic description on various Passive optical network (PON) technologies. A brief comparison between salient features of different PON technologies is also discussed. The paper elucidates the crucial driving factors which envisage innovation of next generation PON technology. To enable the new brand era of high quality triple-play services, many new techniques and procedures are embraced cognizant of the fact that backward compatibility with existing technology is the exigency of industry demand. Thus a common element which can support different types of technology on a same network architecture is discussed in this paper. The paper sheds light on some viable future technologies like 100G EPON, OCDMA-WDM PON and IFDMA-WDM PON and analyses their advantages over existing Next generation technology.
{"title":"Passive Optical Networks: Review and Road Ahead","authors":"Harshit Gupta, Priyal Gupta, Praveen Kumar, Atul Gupta, P. K. Mathur","doi":"10.1109/TENCON.2018.8650204","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650204","url":null,"abstract":"This paper presents a realistic description on various Passive optical network (PON) technologies. A brief comparison between salient features of different PON technologies is also discussed. The paper elucidates the crucial driving factors which envisage innovation of next generation PON technology. To enable the new brand era of high quality triple-play services, many new techniques and procedures are embraced cognizant of the fact that backward compatibility with existing technology is the exigency of industry demand. Thus a common element which can support different types of technology on a same network architecture is discussed in this paper. The paper sheds light on some viable future technologies like 100G EPON, OCDMA-WDM PON and IFDMA-WDM PON and analyses their advantages over existing Next generation technology.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650188
Li Zhang, V. Thing
The proliferation of Internet of Things (IoT) devices is accompanied by the tremendous increase of the attack surface of the networked embedded systems. Software vulnerabilities in these systems become easier than ever to be exploited by cybercriminals. Although fuzz testing is an effective technique to detect memory corruption induced vulnerabilities, it requires in-depth analysis of the typically massive crashes, which impedes the in-time identification and patching of potentially disastrous vulnerabilities. In this paper, we present a new approach that can efficiently classify crashes based on their exploitability, which facilitates the human analysts to prioritize the crashes to be examined and hence accelerate the discovery of vulnerabilities. A compact fingerprint for the dynamic execution trace of each crashing input is firstly generated based on n-gram analysis and feature hashing. The fingerprints are then fed to an online classifier to build the distinguishing model. The incremental learning enabled by the online classifier makes the built model scale well even for a large amount of crashes and at the same time easy to be updated for new crashes. Experiments on 4,392 exploitable crashes and 33,934 non-exploitable crashes show that our method can achieve an F1-score of 95% in detecting the exploitable crashes and significantly better accuracy than the popular crash classification tool !exploitable.
{"title":"Assisting Vulnerability Detection by Prioritizing Crashes with Incremental Learning","authors":"Li Zhang, V. Thing","doi":"10.1109/TENCON.2018.8650188","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650188","url":null,"abstract":"The proliferation of Internet of Things (IoT) devices is accompanied by the tremendous increase of the attack surface of the networked embedded systems. Software vulnerabilities in these systems become easier than ever to be exploited by cybercriminals. Although fuzz testing is an effective technique to detect memory corruption induced vulnerabilities, it requires in-depth analysis of the typically massive crashes, which impedes the in-time identification and patching of potentially disastrous vulnerabilities. In this paper, we present a new approach that can efficiently classify crashes based on their exploitability, which facilitates the human analysts to prioritize the crashes to be examined and hence accelerate the discovery of vulnerabilities. A compact fingerprint for the dynamic execution trace of each crashing input is firstly generated based on n-gram analysis and feature hashing. The fingerprints are then fed to an online classifier to build the distinguishing model. The incremental learning enabled by the online classifier makes the built model scale well even for a large amount of crashes and at the same time easy to be updated for new crashes. Experiments on 4,392 exploitable crashes and 33,934 non-exploitable crashes show that our method can achieve an F1-score of 95% in detecting the exploitable crashes and significantly better accuracy than the popular crash classification tool !exploitable.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650270
Florian Agbuya, G. F. Apolinario, D. Ramos, J. D. Villanueva, Princess Zafe, J. A. Hernandez, Jeremias Coquia
This paper will focus on the design and development of a surface velocity drifter suitable for assessing potential tidal energy sites in the Philippines. This includes the design of the drifter’s structure, communication system and power management. The drifter records initial tidal parameters such as temperature, surface velocity for pre-assessment of tidal in-stream energy (TISE) in a specified deployment location within the country; provide a real-time mobile tracking device for easy monitoring and unit retrieval; operates with a reliable power management system that will enable the device to be sustainable for longer duration of deployment and data acquisition; and utilize system and data evaluation through a user friendly graphical-user interface (GUI).
{"title":"Design of a Real – Time Ocean Data – Logging Drifter Thru CLOUD Technology for Collecting Tidal Parameters","authors":"Florian Agbuya, G. F. Apolinario, D. Ramos, J. D. Villanueva, Princess Zafe, J. A. Hernandez, Jeremias Coquia","doi":"10.1109/TENCON.2018.8650270","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650270","url":null,"abstract":"This paper will focus on the design and development of a surface velocity drifter suitable for assessing potential tidal energy sites in the Philippines. This includes the design of the drifter’s structure, communication system and power management. The drifter records initial tidal parameters such as temperature, surface velocity for pre-assessment of tidal in-stream energy (TISE) in a specified deployment location within the country; provide a real-time mobile tracking device for easy monitoring and unit retrieval; operates with a reliable power management system that will enable the device to be sustainable for longer duration of deployment and data acquisition; and utilize system and data evaluation through a user friendly graphical-user interface (GUI).","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}