A. Dekhane, Adel Djellal, Fouaz Boutebbakh, R. Lakel
In this paper, an application of Convolutional Neural Network (CNN) to detect a predefined fault in vibration signal without any feature extraction. The vibration signal, after being normalized, is converted into a 2-D data called vibration image, and these images are passed in the CNN as input to detect whether there is a fault or not. Experiments are carried out with bearing data from the cooling Fan of a cement oven in CILAS-Biskra. Tests are done using different image sizes, and different training/testing data sets.
{"title":"Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier","authors":"A. Dekhane, Adel Djellal, Fouaz Boutebbakh, R. Lakel","doi":"10.1145/3386723.3387898","DOIUrl":"https://doi.org/10.1145/3386723.3387898","url":null,"abstract":"In this paper, an application of Convolutional Neural Network (CNN) to detect a predefined fault in vibration signal without any feature extraction. The vibration signal, after being normalized, is converted into a 2-D data called vibration image, and these images are passed in the CNN as input to detect whether there is a fault or not. Experiments are carried out with bearing data from the cooling Fan of a cement oven in CILAS-Biskra. Tests are done using different image sizes, and different training/testing data sets.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rise of information and communication technology (ICT), the traditional way of sharing has now been enhanced with the existence of collaborative consumption (CC). CC is described as a peer-to-peer activity in giving, sharing, or lending (as access over ownership) through a community-based online platform facilitated by technology. To further develop the growth of this new concept, it is necessary to understand the motives that contribute to the use of CC. Thus, the purpose of this study is to understand the motives that influence the usage of CC. In achieving this, a thorough analysis of 50 articles to identify the motives from three actors namely (1) the customer, (2) the peer service provider and (3) the peer platform provider was extracted. The six motives found were pertaining to environmental, economic, hedonic, social, utilitarian, and technology factors. From the analysis of the review, the motives were ranked based on the number of frequencies and mapped on a proposed triadic relationship of CC. The study concludes with the opportunity of a business model in this area, and further research on the deterrents of using CC is also suggested.
{"title":"Collaborative Consumption Motives: A Review","authors":"N. Ruslan, A. Mohamed, Norjansalika Janom","doi":"10.1145/3386723.3387852","DOIUrl":"https://doi.org/10.1145/3386723.3387852","url":null,"abstract":"With the rise of information and communication technology (ICT), the traditional way of sharing has now been enhanced with the existence of collaborative consumption (CC). CC is described as a peer-to-peer activity in giving, sharing, or lending (as access over ownership) through a community-based online platform facilitated by technology. To further develop the growth of this new concept, it is necessary to understand the motives that contribute to the use of CC. Thus, the purpose of this study is to understand the motives that influence the usage of CC. In achieving this, a thorough analysis of 50 articles to identify the motives from three actors namely (1) the customer, (2) the peer service provider and (3) the peer platform provider was extracted. The six motives found were pertaining to environmental, economic, hedonic, social, utilitarian, and technology factors. From the analysis of the review, the motives were ranked based on the number of frequencies and mapped on a proposed triadic relationship of CC. The study concludes with the opportunity of a business model in this area, and further research on the deterrents of using CC is also suggested.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"639 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Duplicate detection is the process of detecting multiple representations of same real world's entities. Nowadays, data is known to be heterogeneous, and the larger it becomes, the pairwise comparisons number grows highly as well which makes the task more complex. In recent years, many approaches have been developed and attempted to reduce the number of record pair's comparisons in the process while maintaining high matching quality. There are two well-known algorithms, which are the Sorted Neighborhood Method (SNM) and the Blocking algorithms. Being inspired by both algorithms, we propose an Enhanced Duplicate Count Strategy which is a new hybrid approach that creates iterative blocks using windows with dynamic size. It is based on comparing next element with last duplicate found in the current window. Consequently, comparisons are saved, and similarity distance is minimized, which can lead to higher matching quality.
{"title":"Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate Detection","authors":"Y. Aassem, I. Hafidi, N. Aboutabit","doi":"10.1145/3386723.3387877","DOIUrl":"https://doi.org/10.1145/3386723.3387877","url":null,"abstract":"Duplicate detection is the process of detecting multiple representations of same real world's entities. Nowadays, data is known to be heterogeneous, and the larger it becomes, the pairwise comparisons number grows highly as well which makes the task more complex. In recent years, many approaches have been developed and attempted to reduce the number of record pair's comparisons in the process while maintaining high matching quality. There are two well-known algorithms, which are the Sorted Neighborhood Method (SNM) and the Blocking algorithms. Being inspired by both algorithms, we propose an Enhanced Duplicate Count Strategy which is a new hybrid approach that creates iterative blocks using windows with dynamic size. It is based on comparing next element with last duplicate found in the current window. Consequently, comparisons are saved, and similarity distance is minimized, which can lead to higher matching quality.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.
{"title":"A Survey of Intrusion Detection Algorithm in VANET","authors":"Boughanja Manale, T. Mazri","doi":"10.1145/3386723.3387830","DOIUrl":"https://doi.org/10.1145/3386723.3387830","url":null,"abstract":"Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt
The draft version of ISO 21434 demands, among others, the verification of the car architecture with respect to the enforcement of the security goals. We present a distinct definition of integrity as a system property as well as a formal modeling and analysis approach to verify integrity in a given architecture. Thereby, we discuss the idea of integrity levels as well as security measure levels as metrics to represent a functions worthiness of protection and the reduction of risk, respectively. We present how the beneficence of security measures may be ranked for gaining the global security measure levels. We assign those levels to the system parts and interpret integrity as a global information flow problem. Formal properties enforce the relation between the integrity levels of a function and the assigned security measure level as well as between the communication links and the receiver functions. The relation between communication functions and functions in the same unit of isolation are enforced to follow the policy of no command-up.
ISO 21434的草案版本要求,除其他外,在安全目标的实施方面对汽车架构进行验证。我们提出了完整性作为系统属性的明确定义,以及在给定体系结构中验证完整性的形式化建模和分析方法。因此,我们将讨论完整性级别和安全度量级别的概念,作为分别表示功能值得保护和降低风险的度量。我们提出了如何对安全措施的好处进行排名,以获得全球安全措施水平。我们将这些级别分配给系统部件,并将完整性解释为一个全局信息流问题。形式化属性强化了功能的完整性级别与指定的安全度量级别之间的关系,以及通信链接与接收函数之间的关系。通信功能和同一隔离单元中的功能之间的关系强制遵循不命令的策略。
{"title":"Verification of Integrity in Vehicle Architectures","authors":"Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt","doi":"10.1145/3386723.3387883","DOIUrl":"https://doi.org/10.1145/3386723.3387883","url":null,"abstract":"The draft version of ISO 21434 demands, among others, the verification of the car architecture with respect to the enforcement of the security goals. We present a distinct definition of integrity as a system property as well as a formal modeling and analysis approach to verify integrity in a given architecture. Thereby, we discuss the idea of integrity levels as well as security measure levels as metrics to represent a functions worthiness of protection and the reduction of risk, respectively. We present how the beneficence of security measures may be ranked for gaining the global security measure levels. We assign those levels to the system parts and interpret integrity as a global information flow problem. Formal properties enforce the relation between the integrity levels of a function and the assigned security measure level as well as between the communication links and the receiver functions. The relation between communication functions and functions in the same unit of isolation are enforced to follow the policy of no command-up.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae
The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.
{"title":"Internet of Things: Classification of attacks using CTM method","authors":"Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae","doi":"10.1145/3386723.3387876","DOIUrl":"https://doi.org/10.1145/3386723.3387876","url":null,"abstract":"The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122573713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Khabba, Sanaa Errahili, S. Ibnyaich, M. Hassani
In this letter a new design of miniaturized Leaf Shaped Antenna using slotted ground has been presented. The proposed leaf shaped antenna is designed on the RTRogers5880 substrate to operate at 28GHz for fifth generation. Ten elements of the single antenna are printed on the top edge of the substrate with overall dimensions are 60×100x0.8mm3 to form a linear phased array for 5G mobile phone. The 5G antenna is designed using CST software, the simulated results show good performances in terms of S-parameters, gain, efficiency and phased array property which make it suitable for 5G mobile phone applications.
{"title":"A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones","authors":"Asma Khabba, Sanaa Errahili, S. Ibnyaich, M. Hassani","doi":"10.1145/3386723.3387878","DOIUrl":"https://doi.org/10.1145/3386723.3387878","url":null,"abstract":"In this letter a new design of miniaturized Leaf Shaped Antenna using slotted ground has been presented. The proposed leaf shaped antenna is designed on the RTRogers5880 substrate to operate at 28GHz for fifth generation. Ten elements of the single antenna are printed on the top edge of the substrate with overall dimensions are 60×100x0.8mm3 to form a linear phased array for 5G mobile phone. The 5G antenna is designed using CST software, the simulated results show good performances in terms of S-parameters, gain, efficiency and phased array property which make it suitable for 5G mobile phone applications.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Face Sketch recognition has been one of the most studied topics in Forensic literature. The automatic retrieval of suspect photos from the mug-shot police data-base can help them, quickly reduce and deduct potential suspects, but in most cases, the photographic image of a suspect is not available. The best substitute is often sketch based on the memory of an eyewitness or a victim. Generally, this process is slow and really not effective, it does not allow to find and arrest the right suspect. So, a stronger algorithm for even partial face sketch recognition can be useful. Although many methods have been proposed in this scenario, especially the techniques that are applied to face recognition system and ranked among the perfect and most effective. The main objective of this paper is to presents a review of recent and different researches on recognizing face sketches. We wrote this work to discover and analyze multiple researches on face sketch recognition. We wrote it to review the different classes of approaches, of datasets and evaluation protocols used, by analyzing their kernels and identifying their limitations.
{"title":"Face Sketch Recognition-An Overview","authors":"Khalid Ounachad, M. Oualla, A. Souhar, A. Sadiq","doi":"10.1145/3386723.3387857","DOIUrl":"https://doi.org/10.1145/3386723.3387857","url":null,"abstract":"Face Sketch recognition has been one of the most studied topics in Forensic literature. The automatic retrieval of suspect photos from the mug-shot police data-base can help them, quickly reduce and deduct potential suspects, but in most cases, the photographic image of a suspect is not available. The best substitute is often sketch based on the memory of an eyewitness or a victim. Generally, this process is slow and really not effective, it does not allow to find and arrest the right suspect. So, a stronger algorithm for even partial face sketch recognition can be useful. Although many methods have been proposed in this scenario, especially the techniques that are applied to face recognition system and ranked among the perfect and most effective. The main objective of this paper is to presents a review of recent and different researches on recognizing face sketches. We wrote this work to discover and analyze multiple researches on face sketch recognition. We wrote it to review the different classes of approaches, of datasets and evaluation protocols used, by analyzing their kernels and identifying their limitations.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dialogue or conversational systems including chatbots, and personal assistants are becoming ubiquitous in modern society. Here we present a question answering system that's help a customer to search a product in an ecommerce website and inquiring about it. This article describes a question answering bot, which is based on deep learning. We develop a set of deep learning models for natural language retrieval and generation --- including recurrent neural networks, sequence-to-sequence models and attention mechanism --- and evaluate them in the context of natural language processing. Thus; we have used those technologies in a grammatical correction system, and a question answering system by passing the first model result as input to the second one, in order to improve result.
{"title":"A Question answering System with a sequence to sequence grammatical correction","authors":"Bghiel Afrae, M. Ahmed, A. Boudhir","doi":"10.1145/3386723.3387894","DOIUrl":"https://doi.org/10.1145/3386723.3387894","url":null,"abstract":"Dialogue or conversational systems including chatbots, and personal assistants are becoming ubiquitous in modern society. Here we present a question answering system that's help a customer to search a product in an ecommerce website and inquiring about it. This article describes a question answering bot, which is based on deep learning. We develop a set of deep learning models for natural language retrieval and generation --- including recurrent neural networks, sequence-to-sequence models and attention mechanism --- and evaluate them in the context of natural language processing. Thus; we have used those technologies in a grammatical correction system, and a question answering system by passing the first model result as input to the second one, in order to improve result.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131927258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of this paper is to summarize a comparative account of unsupervised and supervised deep learning models and their applications. The design of a model system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples and performance evaluation. Classification plays a vital role in deep learning algorithms and we found that, though the error backpropagation learning algorithm as provided by supervised learning model, is very efficient for a number of non-linear real-time problems, KSOM of unsupervised learning model, offers efficient solution and classification in the perception problem.
{"title":"Deep Learning Algorithms and Their Applications in the Perception Problem","authors":"Redouane Lhiadi","doi":"10.1145/3386723.3387866","DOIUrl":"https://doi.org/10.1145/3386723.3387866","url":null,"abstract":"The objective of this paper is to summarize a comparative account of unsupervised and supervised deep learning models and their applications. The design of a model system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples and performance evaluation. Classification plays a vital role in deep learning algorithms and we found that, though the error backpropagation learning algorithm as provided by supervised learning model, is very efficient for a number of non-linear real-time problems, KSOM of unsupervised learning model, offers efficient solution and classification in the perception problem.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"132 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132801204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}