首页 > 最新文献

2017 Tenth International Conference on Contemporary Computing (IC3)最新文献

英文 中文
Adversarial attacks on computer vision algorithms using natural perturbations 利用自然扰动对计算机视觉算法进行对抗性攻击
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284294
A. Ramanathan, L. Pullum, Zubir Husein, Sunny Raj, N. Torosdagli, S. Pattanaik, Sumit Kumar Jha
Verifying the correctness of intelligent embedded systems is notoriously difficult due to the use of machine learning algorithms that cannot provide guarantees of deterministic correctness. In this paper, our validation efforts demonstrate that the OpenCV Histogram of Oriented Gradients (HOG) implementation for human detection is susceptible to errors due to both malicious perturbations and naturally occurring fog phenomena. To the best of our knowledge, we are the first to explicitly employ a natural perturbation (like fog) as an adversarial attack using methods from computer graphics. Our experimental results show that computer vision algorithms are susceptible to errors under a small set of naturally occurring perturbations even if they are robust to a majority of such perturbations. Our methods and results may be of interest to the designers, developers and validation teams of intelligent cyber-physical systems such as autonomous cars.
验证智能嵌入式系统的正确性是出了名的困难,因为机器学习算法的使用不能提供确定性正确性的保证。在本文中,我们的验证工作表明,用于人类检测的OpenCV定向梯度直方图(HOG)实现容易受到恶意扰动和自然发生的雾现象的影响。据我们所知,我们是第一个使用计算机图形学方法明确地使用自然扰动(如雾)作为对抗性攻击的人。我们的实验结果表明,计算机视觉算法在一小部分自然发生的扰动下容易出错,即使它们对大多数这样的扰动是鲁棒的。我们的方法和结果可能会对智能网络物理系统(如自动驾驶汽车)的设计师、开发人员和验证团队感兴趣。
{"title":"Adversarial attacks on computer vision algorithms using natural perturbations","authors":"A. Ramanathan, L. Pullum, Zubir Husein, Sunny Raj, N. Torosdagli, S. Pattanaik, Sumit Kumar Jha","doi":"10.1109/IC3.2017.8284294","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284294","url":null,"abstract":"Verifying the correctness of intelligent embedded systems is notoriously difficult due to the use of machine learning algorithms that cannot provide guarantees of deterministic correctness. In this paper, our validation efforts demonstrate that the OpenCV Histogram of Oriented Gradients (HOG) implementation for human detection is susceptible to errors due to both malicious perturbations and naturally occurring fog phenomena. To the best of our knowledge, we are the first to explicitly employ a natural perturbation (like fog) as an adversarial attack using methods from computer graphics. Our experimental results show that computer vision algorithms are susceptible to errors under a small set of naturally occurring perturbations even if they are robust to a majority of such perturbations. Our methods and results may be of interest to the designers, developers and validation teams of intelligent cyber-physical systems such as autonomous cars.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122170016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Image based search engine using deep learning 基于图像的深度学习搜索引擎
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284301
Surbhi Jain, J. Dhar
During previous couple of years, the World Wide Web (WWW) has become an extremely well-liked information source. To successfully utilize the vast quantity of information that the web provides, we want an effective way to explore it. Image data is much more voluminous than textual data, and visual information cannot be indexed by traditional strategies developed for indexing textual information. Therefore, Content-Based Image Retrieval (CBIR) has received an excellent deal of interest within the research community. A CBIR system operates on the visible features at low-level of a user's input image that makes it troublesome for the users to devise the input and additionally doesn't offer adequate retrieval results. In CBIR system, the study of the useful representation of features and appropriate similarity metrics is extremely necessary for improving the performance of retrieval task. Semantic gap has been the main issue which occurs between image pixels at low-level and semantics at high-level interpreted by humans. Among varied methods, machine learning (ML) has been explored as a feasible way to reduce the semantic gap. Inspired by the current success of deep learning methods for computer vision applications, in this paper, we aim to confront an advance deep learning method, known as Convolutional Neural Network (CNN), for studying feature representations and similarity measures. In this paper, we explored the applications of CNNs towards solving classification and retrieval problems. For retrieval of similar images, we agreed on using transfer learning to apply the GoogleNet deep architecture to our problem. Extracting the last-but-one fully connected layer from the retraining of GoogleNet CNN model served as the feature vectors for each image, computing Euclidean distances between these feature vectors and that of our query image to return the closest matches in the dataset.
在过去的几年里,万维网(WWW)已经成为一个非常受欢迎的信息来源。为了成功地利用网络提供的大量信息,我们需要一种有效的方法来探索它。图像数据比文本数据要庞大得多,而传统的文本信息索引策略无法对视觉信息进行索引。因此,基于内容的图像检索(CBIR)在研究界受到了极大的关注。CBIR系统对用户输入图像的底层可见特征进行操作,这给用户设计输入带来了麻烦,而且不能提供足够的检索结果。在CBIR系统中,研究有用的特征表示和合适的相似度度量对于提高检索任务的性能是非常必要的。语义差距一直是图像像素在低层次与人类解释的高层次语义之间的主要问题。在各种方法中,机器学习(ML)被认为是减少语义差距的一种可行方法。受当前计算机视觉应用中深度学习方法的成功启发,在本文中,我们的目标是面对一种先进的深度学习方法,即卷积神经网络(CNN),用于研究特征表示和相似性度量。在本文中,我们探讨了cnn在解决分类和检索问题上的应用。对于相似图像的检索,我们同意使用迁移学习将GoogleNet深度架构应用于我们的问题。从GoogleNet CNN模型的再训练中提取最后一个完全连接层作为每个图像的特征向量,计算这些特征向量与查询图像之间的欧氏距离,返回数据集中最接近的匹配。
{"title":"Image based search engine using deep learning","authors":"Surbhi Jain, J. Dhar","doi":"10.1109/IC3.2017.8284301","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284301","url":null,"abstract":"During previous couple of years, the World Wide Web (WWW) has become an extremely well-liked information source. To successfully utilize the vast quantity of information that the web provides, we want an effective way to explore it. Image data is much more voluminous than textual data, and visual information cannot be indexed by traditional strategies developed for indexing textual information. Therefore, Content-Based Image Retrieval (CBIR) has received an excellent deal of interest within the research community. A CBIR system operates on the visible features at low-level of a user's input image that makes it troublesome for the users to devise the input and additionally doesn't offer adequate retrieval results. In CBIR system, the study of the useful representation of features and appropriate similarity metrics is extremely necessary for improving the performance of retrieval task. Semantic gap has been the main issue which occurs between image pixels at low-level and semantics at high-level interpreted by humans. Among varied methods, machine learning (ML) has been explored as a feasible way to reduce the semantic gap. Inspired by the current success of deep learning methods for computer vision applications, in this paper, we aim to confront an advance deep learning method, known as Convolutional Neural Network (CNN), for studying feature representations and similarity measures. In this paper, we explored the applications of CNNs towards solving classification and retrieval problems. For retrieval of similar images, we agreed on using transfer learning to apply the GoogleNet deep architecture to our problem. Extracting the last-but-one fully connected layer from the retraining of GoogleNet CNN model served as the feature vectors for each image, computing Euclidean distances between these feature vectors and that of our query image to return the closest matches in the dataset.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Design of people counting system using MATLAB 用MATLAB设计人数统计系统
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284344
Surbhi Saxena, Dalpat Songara
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. To properly manage security in various places, it is of great importance to introduce video surveillance. This paper introduces an automatic people counting system which can count multiple people who interact in the region of interest, by using only one camera. The algorithm uses Viola Jones method of facial recognition to detect people. Using a single overhead mounted camera, the system counts the number of people going in to an observed area. Counting is performed by analyzing the image to detect faces. We have tested the performance of the system, achieving a correct people counting rate of 85%.
自动计数人员,进入或离开感兴趣的区域,对于业务和安全应用程序都非常重要。为了妥善管理各个场所的安全,引入视频监控是非常重要的。本文介绍了一种自动计数系统,该系统仅使用一台摄像机就可以计数在感兴趣区域内相互作用的多人。该算法使用维奥拉·琼斯的面部识别方法来检测人。该系统使用一个安装在头顶的摄像头,计算进入观察区域的人数。计数是通过分析图像来检测人脸。我们对系统的性能进行了测试,实现了正确的人员计数率为85%。
{"title":"Design of people counting system using MATLAB","authors":"Surbhi Saxena, Dalpat Songara","doi":"10.1109/IC3.2017.8284344","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284344","url":null,"abstract":"Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. To properly manage security in various places, it is of great importance to introduce video surveillance. This paper introduces an automatic people counting system which can count multiple people who interact in the region of interest, by using only one camera. The algorithm uses Viola Jones method of facial recognition to detect people. Using a single overhead mounted camera, the system counts the number of people going in to an observed area. Counting is performed by analyzing the image to detect faces. We have tested the performance of the system, achieving a correct people counting rate of 85%.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resolving identities on Facebook and Twitter 解决Facebook和Twitter上的身份问题
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284354
Suyash Somani, Somya Jain
In the current time zone, the utilization of online web-based social networking systems has developed exponentially with clients investing the vast majority of the energy of their life associating with the world by means of web-based social networking. Systems like Twitter, Facebook, Instagram, LinkedIn and so forth are the most acclaimed ones with greatest number of clients over the world. The un-linking of the systems enables clients to contaminate the web-based social networking by undesirable materials and still stay mysterious. With the utilization of a worldwide identifier, it will be anything but difficult to inquiry them. In the writing proposed, personality determination has been broken into 2 sections i.e. Identity Search and identity matching with various traits mulled over. Properties like Username, Profile picture, Content of the posts and specified URLs are contemplated and a group of these gave enhanced outcomes.
在当前时区,基于web的在线社交网络系统的使用呈指数级增长,客户通过基于web的社交网络投入了他们生活中绝大部分的精力。像Twitter、Facebook、Instagram、LinkedIn等系统是世界上最受欢迎的系统,拥有最多的客户。系统的不连接使客户可以用不受欢迎的材料污染基于网络的社交网络,但仍然保持神秘。使用世界范围标识符后,查询它们将变得毫不困难。在建议的写作中,人格决定被分为两个部分,即身份搜索和与各种特征相匹配的身份。用户名、个人资料图片、帖子内容和指定的url等属性都是考虑的,其中一组给出了增强的结果。
{"title":"Resolving identities on Facebook and Twitter","authors":"Suyash Somani, Somya Jain","doi":"10.1109/IC3.2017.8284354","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284354","url":null,"abstract":"In the current time zone, the utilization of online web-based social networking systems has developed exponentially with clients investing the vast majority of the energy of their life associating with the world by means of web-based social networking. Systems like Twitter, Facebook, Instagram, LinkedIn and so forth are the most acclaimed ones with greatest number of clients over the world. The un-linking of the systems enables clients to contaminate the web-based social networking by undesirable materials and still stay mysterious. With the utilization of a worldwide identifier, it will be anything but difficult to inquiry them. In the writing proposed, personality determination has been broken into 2 sections i.e. Identity Search and identity matching with various traits mulled over. Properties like Username, Profile picture, Content of the posts and specified URLs are contemplated and a group of these gave enhanced outcomes.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient algorithm for sampling of a single large graph 对单个大图进行采样的有效算法
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284290
Vandana Bhatia, Rinkle Rani
Graph Databases offer a very influential way to provide an instinctual representation for many applications spanning from social networks, web networks to biological networks. In the current era of big data, the size of the graph is increasing exponentially. It is difficult for the conventional machines to analyze a whole graph. To overcome this, the characteristics of the large graphs are estimated via sampling in order to identify trends and patterns in the large graph. The existing sampling techniques such as random node and random walk do not provide consistent efficiency over the graphs. In this paper, an efficient sampling algorithm named Influence sampling (IS) is proposed which sample the graphs by analyzing the degree of the vertices of the graph such that the most influential vertices remain in the graph sample. The experiments are performed over three real life datasets and the performance is compared with the three existing sampling algorithms. It is shown that IS performs well in the terms of accuracy.
图数据库提供了一种非常有影响力的方式,为从社交网络、web网络到生物网络的许多应用程序提供了一种本能的表示。在当前的大数据时代,图的大小呈指数级增长。传统的机器很难分析整个图。为了克服这个问题,通过抽样来估计大图的特征,以便识别大图中的趋势和模式。现有的随机节点和随机漫步等抽样技术在图上不能提供一致的效率。本文提出了一种高效的采样算法——影响采样(Influence sampling, IS),该算法通过分析图中顶点的程度对图进行采样,使最有影响的顶点留在图样本中。在三个真实数据集上进行了实验,并与现有的三种采样算法进行了性能比较。结果表明,is在精度方面表现良好。
{"title":"An efficient algorithm for sampling of a single large graph","authors":"Vandana Bhatia, Rinkle Rani","doi":"10.1109/IC3.2017.8284290","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284290","url":null,"abstract":"Graph Databases offer a very influential way to provide an instinctual representation for many applications spanning from social networks, web networks to biological networks. In the current era of big data, the size of the graph is increasing exponentially. It is difficult for the conventional machines to analyze a whole graph. To overcome this, the characteristics of the large graphs are estimated via sampling in order to identify trends and patterns in the large graph. The existing sampling techniques such as random node and random walk do not provide consistent efficiency over the graphs. In this paper, an efficient sampling algorithm named Influence sampling (IS) is proposed which sample the graphs by analyzing the degree of the vertices of the graph such that the most influential vertices remain in the graph sample. The experiments are performed over three real life datasets and the performance is compared with the three existing sampling algorithms. It is shown that IS performs well in the terms of accuracy.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approaches for information retrieval in legal documents 法律文书信息检索方法研究
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284324
Rachayita Giri, Yosha Porwal, Vaibhavi Shukla, Palak Chadha, Rishabh Kaushal
With crimes increasing at an alarming rate, it becomes essential to impart justice to the victims readily. To come to a final decision, lawyers need to study several previous judgments for research purposes. Reducing the time spent on research can speed up the judicial process drastically. The time consumption mostly happens in two areas — searching for the right document and understanding that document. To start with, being able to get hold of the appropriate judgments or other legal documents is the most essential task for any legal professional, especially lawyers. Once a document is obtained, the next most integral and inevitable task is to read and re-read it, and come to necessary as well as needful conclusions after a comprehensive analysis. To resolve the first issue, there is a need for an efficient search system which can provide searching options based upon multiple views. This system is an effort at improving the search for users by providing them with search options based upon either the semantics of the word or based upon the IPC sections. It is important that laymen can access all the related judgments by entering just one keyword or phrase without bothering about the legal jargon. Post retrieval of documents, the lengthy texts have to be scrutinized for meaningful inferences. To reduce the time spent in reading texts, we intend to present the information in the judgments visually through semantic networks. Lawyers will be benefitted by this system because it will enable them to skip the complexity of the often verbose language of the legal documents. This IR System provides the features of semantic and IPC section based search to users, deriving information from semantic networks that are representative of the documents, so that a more efficient search system on legal documents can be put in place.
随着犯罪以惊人的速度增加,迅速为受害者伸张正义变得至关重要。为了做出最终决定,律师需要研究之前的几项判决。减少花在研究上的时间可以大大加快司法程序。时间消耗主要发生在两个方面——搜索正确的文档和理解该文档。首先,能够获得适当的判决书或其他法律文件是任何法律专业人士,尤其是律师最重要的任务。一旦获得了一份文件,下一个最完整和不可避免的任务就是反复阅读,并在全面分析后得出必要的和必要的结论。为了解决第一个问题,需要一个高效的搜索系统,它可以提供基于多个视图的搜索选项。该系统通过为用户提供基于单词语义或基于IPC部分的搜索选项来改进搜索。重要的是,外行可以通过输入一个关键词或短语来访问所有相关的判决,而不必担心法律术语。在检索文件后,必须仔细检查冗长的文本以寻找有意义的推论。为了减少阅读文本所花费的时间,我们打算通过语义网络可视化地呈现判断中的信息。律师将从这个系统中受益,因为它将使他们能够跳过法律文件中往往冗长的语言的复杂性。该IR系统为用户提供了基于语义和IPC部分的搜索功能,从具有代表性的文件的语义网络中提取信息,从而可以建立一个更有效的法律文件搜索系统。
{"title":"Approaches for information retrieval in legal documents","authors":"Rachayita Giri, Yosha Porwal, Vaibhavi Shukla, Palak Chadha, Rishabh Kaushal","doi":"10.1109/IC3.2017.8284324","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284324","url":null,"abstract":"With crimes increasing at an alarming rate, it becomes essential to impart justice to the victims readily. To come to a final decision, lawyers need to study several previous judgments for research purposes. Reducing the time spent on research can speed up the judicial process drastically. The time consumption mostly happens in two areas — searching for the right document and understanding that document. To start with, being able to get hold of the appropriate judgments or other legal documents is the most essential task for any legal professional, especially lawyers. Once a document is obtained, the next most integral and inevitable task is to read and re-read it, and come to necessary as well as needful conclusions after a comprehensive analysis. To resolve the first issue, there is a need for an efficient search system which can provide searching options based upon multiple views. This system is an effort at improving the search for users by providing them with search options based upon either the semantics of the word or based upon the IPC sections. It is important that laymen can access all the related judgments by entering just one keyword or phrase without bothering about the legal jargon. Post retrieval of documents, the lengthy texts have to be scrutinized for meaningful inferences. To reduce the time spent in reading texts, we intend to present the information in the judgments visually through semantic networks. Lawyers will be benefitted by this system because it will enable them to skip the complexity of the often verbose language of the legal documents. This IR System provides the features of semantic and IPC section based search to users, deriving information from semantic networks that are representative of the documents, so that a more efficient search system on legal documents can be put in place.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130059562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network IP欺骗等级攻击对6LoWPAN网络路由的影响分析
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284340
K. Rai, Krishna Asawa
The routing protocol — RPL for low power and lossy networks is the fundamental routing convention of 6LoWPAN. The introduction of rank idea in RPL serves numerous intentions, including path optimization, prevention of loops, and managing control overhead. Since the RPL is currently used as the main routing protocol, for large scale low-power and lossy networks, the concept of “Rank” can lead to a vulnerable performance due to the internal threats in RPL based networks. It is studied that an attack on the rank property with legitimate IP can degrade the network performance in the aspect of the delivery ratio and end-to-end delay. And this can be further degraded if node's IP gets spoofed by the attacker node. This work discuss the impact of rank attack when the attack is launched by the node having a spoofed IP address. Performance is measured in terms of packet delivery ratio and end-to-end delay of packets. The observations show that the Rank attack with spoofed IP has more impact on the degradation of delivery ratio.
低功耗和损耗网络的路由协议RPL是6LoWPAN的基本路由协议。在RPL中引入等级思想有许多目的,包括路径优化、防止循环和管理控制开销。由于RPL目前是主要的路由协议,对于大规模的低功耗和有损耗的网络,由于RPL网络的内部威胁,“Rank”的概念可能导致性能脆弱。研究了对具有合法IP的rank属性的攻击会在发送率和端到端延迟方面降低网络性能。如果节点的IP被攻击者节点欺骗,这可能会进一步降低。本文讨论了IP地址被欺骗的节点发起攻击时rank攻击的影响。性能是根据数据包的发送率和数据包的端到端延迟来衡量的。观察结果表明,带有欺骗IP的Rank攻击对投递率的退化影响更大。
{"title":"Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network","authors":"K. Rai, Krishna Asawa","doi":"10.1109/IC3.2017.8284340","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284340","url":null,"abstract":"The routing protocol — RPL for low power and lossy networks is the fundamental routing convention of 6LoWPAN. The introduction of rank idea in RPL serves numerous intentions, including path optimization, prevention of loops, and managing control overhead. Since the RPL is currently used as the main routing protocol, for large scale low-power and lossy networks, the concept of “Rank” can lead to a vulnerable performance due to the internal threats in RPL based networks. It is studied that an attack on the rank property with legitimate IP can degrade the network performance in the aspect of the delivery ratio and end-to-end delay. And this can be further degraded if node's IP gets spoofed by the attacker node. This work discuss the impact of rank attack when the attack is launched by the node having a spoofed IP address. Performance is measured in terms of packet delivery ratio and end-to-end delay of packets. The observations show that the Rank attack with spoofed IP has more impact on the degradation of delivery ratio.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130167204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Smart intersection control algorithms for automated vehicles 自动驾驶车辆的智能交叉口控制算法
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284361
Mahmoud Pourmehrab, L. Elefteriadou, S. Ranka
The pace at which autonomous vehicle technology is reaching consumers is accelerating. Furthermore, the future driverless cars are intended to be talkative with regard to exchanging information with other vehicles, infrastructure, or even cloud. More recent attention has focused on the provision of frameworks to take advantage of automated and connected vehicle technology. This study proposes a system design to allow safe and efficient traffic of both automated/connected and conventional vehicles approaching an isolated intersection. The benefit mainly comes from the ability of automated/connected vehicles to maintain shorter and more stable headways to the vehicle in ahead compared to conventional vehicles. Simulation experiments are conducted to gain insight into the influence of flow and automated vehicle ratio over the performance of intersection.
自动驾驶汽车技术走向消费者的步伐正在加快。此外,未来的无人驾驶汽车旨在与其他车辆、基础设施甚至云交换信息。最近,更多的注意力集中在提供框架,以利用自动化和互联汽车技术。本研究提出了一种系统设计,允许自动/联网车辆和传统车辆安全高效地接近孤立的十字路口。与传统车辆相比,其优势主要来自于自动/联网车辆与前车保持更短、更稳定的距离的能力。通过仿真实验研究了流量和自动车辆比例对交叉口性能的影响。
{"title":"Smart intersection control algorithms for automated vehicles","authors":"Mahmoud Pourmehrab, L. Elefteriadou, S. Ranka","doi":"10.1109/IC3.2017.8284361","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284361","url":null,"abstract":"The pace at which autonomous vehicle technology is reaching consumers is accelerating. Furthermore, the future driverless cars are intended to be talkative with regard to exchanging information with other vehicles, infrastructure, or even cloud. More recent attention has focused on the provision of frameworks to take advantage of automated and connected vehicle technology. This study proposes a system design to allow safe and efficient traffic of both automated/connected and conventional vehicles approaching an isolated intersection. The benefit mainly comes from the ability of automated/connected vehicles to maintain shorter and more stable headways to the vehicle in ahead compared to conventional vehicles. Simulation experiments are conducted to gain insight into the influence of flow and automated vehicle ratio over the performance of intersection.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A fast and scalable crowd sensing based trajectory tracking system 一种快速、可扩展的基于人群传感的轨迹跟踪系统
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284303
R. Niyogi, Tarun Kulshrestha, Dhaval Patel
Crowd Sensing collects users' local knowledge such as local information, ambient context, and traffic conditions, etc., using their sensor-enabled devices. The collected information is further aggregated and transferred to the cloud for detailed analysis, such as places / friends recommendation, human behavior, criminal activities, etc. These tracking and monitoring systems must be scalable, fast, and easy to deploy to meet the requirements of a real-time system. In this paper, we propose a fast and scalable crowdsensing based trajectory tracking system which can track any person having the smartphone and can provide a complete analysis of her visited locations in a given time span. We use the Redis in-memory database and XMPP at the sensing units for fast data retrieval and exchange. When a person moves to a new location, WebSocket server updates that person's new location automatically among all sensing units to make the system analysis in real-time. We develop and deploy a real prototype testbed in IIT Roorkee campus and evaluate it extensively to demonstrate the efficiency and scalability of our proposed system.
Crowd Sensing通过用户的传感器设备收集用户的本地信息,如本地信息、环境背景和交通状况等。收集到的信息被进一步汇总并传输到云端进行详细分析,例如地点/朋友推荐、人类行为、犯罪活动等。这些跟踪和监控系统必须是可扩展的、快速的、易于部署的,以满足实时系统的要求。在本文中,我们提出了一个快速和可扩展的基于众感的轨迹跟踪系统,该系统可以跟踪任何拥有智能手机的人,并可以在给定的时间跨度内提供她访问过的地点的完整分析。我们在传感单元使用Redis内存数据库和XMPP进行快速数据检索和交换。当一个人移动到一个新的位置时,WebSocket服务器自动在所有传感单元中更新这个人的新位置,以便实时进行系统分析。我们在IIT Roorkee校区开发并部署了一个真实的原型测试平台,并对其进行了广泛的评估,以证明我们提出的系统的效率和可扩展性。
{"title":"A fast and scalable crowd sensing based trajectory tracking system","authors":"R. Niyogi, Tarun Kulshrestha, Dhaval Patel","doi":"10.1109/IC3.2017.8284303","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284303","url":null,"abstract":"Crowd Sensing collects users' local knowledge such as local information, ambient context, and traffic conditions, etc., using their sensor-enabled devices. The collected information is further aggregated and transferred to the cloud for detailed analysis, such as places / friends recommendation, human behavior, criminal activities, etc. These tracking and monitoring systems must be scalable, fast, and easy to deploy to meet the requirements of a real-time system. In this paper, we propose a fast and scalable crowdsensing based trajectory tracking system which can track any person having the smartphone and can provide a complete analysis of her visited locations in a given time span. We use the Redis in-memory database and XMPP at the sensing units for fast data retrieval and exchange. When a person moves to a new location, WebSocket server updates that person's new location automatically among all sensing units to make the system analysis in real-time. We develop and deploy a real prototype testbed in IIT Roorkee campus and evaluate it extensively to demonstrate the efficiency and scalability of our proposed system.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fixed and dynamic threshold selection criteria in energy detection for cognitive radio communication systems 认知无线电通信系统能量检测的固定和动态阈值选择准则
Pub Date : 2017-08-01 DOI: 10.1109/IC3.2017.8284302
Alok Kumar, P. Thakur, S. Pandit, G. Singh
Spectrum sensing is a key step in cognitive radio communication systems. The probability of detection and probability of false-alarm are two crucial performance parameters in spectrum sensing. In this paper, we have presented the effect of selection of fixed and dynamic threshold scheme of energy detection technique on various spectrum sensing performance parameters such as probability of detection, probability of false-alarm, and probability of error, considering the constant noise variance in the channel. In addition to this, we have also computed the minimum value of time-bandwidth product when the noise variance is constant or variable in the channel.
频谱感知是认知无线电通信系统的关键环节。检测概率和虚警概率是频谱感知中两个至关重要的性能参数。本文在考虑信道中恒定噪声方差的情况下,研究了能量检测技术中固定阈值方案和动态阈值方案的选择对检测概率、虚警概率和误差概率等频谱传感性能参数的影响。除此之外,我们还计算了信道中噪声方差恒定或可变时的时间带宽积的最小值。
{"title":"Fixed and dynamic threshold selection criteria in energy detection for cognitive radio communication systems","authors":"Alok Kumar, P. Thakur, S. Pandit, G. Singh","doi":"10.1109/IC3.2017.8284302","DOIUrl":"https://doi.org/10.1109/IC3.2017.8284302","url":null,"abstract":"Spectrum sensing is a key step in cognitive radio communication systems. The probability of detection and probability of false-alarm are two crucial performance parameters in spectrum sensing. In this paper, we have presented the effect of selection of fixed and dynamic threshold scheme of energy detection technique on various spectrum sensing performance parameters such as probability of detection, probability of false-alarm, and probability of error, considering the constant noise variance in the channel. In addition to this, we have also computed the minimum value of time-bandwidth product when the noise variance is constant or variable in the channel.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 Tenth International Conference on Contemporary Computing (IC3)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1