首页 > 最新文献

14th Conference of Open Innovation Association FRUCT最新文献

英文 中文
Development of the St. Petersburg's linked open data site using Information Workbench 利用信息工作台开发圣彼得堡的链接开放数据站点
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737948
D. Mouromtsev, Vitaly Vlasov, Olga Parkhimovich, Mikhail Galkin, Vitaly Knyazev
This paper discusses the Russian projects publishing open government data. The article also describes the development of the open linked data portal and its approach to convert open government data in the open linked data. Information Workbench is used to build this system. It allows storing, visualizing and converting data files in Semantic Web formats.
本文讨论了俄罗斯政府数据公开项目。本文还介绍了开放链接数据门户网站的开发及其在开放链接数据中转换开放政府数据的方法。利用信息工作台构建该系统。它允许以语义Web格式存储、可视化和转换数据文件。
{"title":"Development of the St. Petersburg's linked open data site using Information Workbench","authors":"D. Mouromtsev, Vitaly Vlasov, Olga Parkhimovich, Mikhail Galkin, Vitaly Knyazev","doi":"10.1109/FRUCT.2013.6737948","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737948","url":null,"abstract":"This paper discusses the Russian projects publishing open government data. The article also describes the development of the open linked data portal and its approach to convert open government data in the open linked data. Information Workbench is used to build this system. It allows storing, visualizing and converting data files in Semantic Web formats.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123033747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Too young to be secure: Analysis of UEFI threats and vulnerabilities 太年轻而不安全:UEFI威胁和漏洞分析
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737940
V. Bashun, A. Sergeev, Victor Minchenkov, A. Yakovlev
Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.
UEFI (Unified Extensible Firmware Interface)是操作系统和平台固件之间的软件接口,旨在取代传统的BIOS。一般来说,UEFI比BIOS有很多技术优势(pre-OS环境,引导和运行时服务,cpu独立驱动程序等),包括强大的安全机制(例如安全引导,更新等)。它们旨在提供平台完整性,作为安全架构的信任根,控制引导过程的所有阶段,直到将控制权传递给经过认证的操作系统内核。另一方面,UEFI技术是许多新的潜在威胁和利用的焦点,并提出了必须管理的新漏洞。本研究的主要目的是对UEFI安全问题进行分析,找到安全问题的点和来源,并对其进行分类。本文描述了UEFI的架构和实现问题,这些问题导致了威胁、漏洞和攻击。它还包括对这一领域以前的研究活动和我们自己的实验结果的广泛回顾。作为工作的结果,对如何使这一年轻技术更加安全提出了一些建议。
{"title":"Too young to be secure: Analysis of UEFI threats and vulnerabilities","authors":"V. Bashun, A. Sergeev, Victor Minchenkov, A. Yakovlev","doi":"10.1109/FRUCT.2013.6737940","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737940","url":null,"abstract":"Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In general, UEFI has many technical advantages over BIOS (pre-OS environment, boot and run-time services, CPU-independent drivers etc.) including also powerful security mechanisms (e.g. secure boot, update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. From the other side UEFI technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. The main goal of this research is to provide analysis of the UEFI security issues, find the point and source of the security problems and classify them. The paper describes the architectural and implementation troubles of UEFI which lead to threats, vulnerabilities and attacks. It also includes extensive review of the previous research activities in this area and the results of our own experiments. As the result of the work some recommendation about how to make this young technology more safe and secure are provided.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127418126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application for video analysis based on machine learning and computer vision algorithms 基于机器学习和计算机视觉算法的视频分析应用
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737950
V. Pavlov, V. Khryashchev, Evgeny Pavlov, L. Shmaglit
An application for video data analysis based on computer vision methods is presented. The proposed system consists of five consecutive stages: face detection, face tracking, gender recognition, age classification and statistics analysis. AdaBoost classifier is utilized for face detection. A modification of Lucas and Kanade algorithm is introduced on the stage of tracking. Novel gender and age classifiers based on adaptive features and support vector machines are proposed. All the stages are united into a single system of audience analysis. The proposed software complex can find its applications in different areas, from digital signage and video surveillance to automatic systems of accident prevention and intelligent human-computer interfaces.
介绍了一种基于计算机视觉方法的视频数据分析应用。该系统包括五个连续的阶段:人脸检测、人脸跟踪、性别识别、年龄分类和统计分析。AdaBoost分类器用于人脸检测。在跟踪阶段对Lucas和Kanade算法进行了改进。提出了一种基于自适应特征和支持向量机的性别和年龄分类器。所有的舞台都统一成一个单一的观众分析系统。所提出的软件综合体可以在不同的领域找到它的应用,从数字标牌和视频监控到事故预防和智能人机界面的自动系统。
{"title":"Application for video analysis based on machine learning and computer vision algorithms","authors":"V. Pavlov, V. Khryashchev, Evgeny Pavlov, L. Shmaglit","doi":"10.1109/FRUCT.2013.6737950","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737950","url":null,"abstract":"An application for video data analysis based on computer vision methods is presented. The proposed system consists of five consecutive stages: face detection, face tracking, gender recognition, age classification and statistics analysis. AdaBoost classifier is utilized for face detection. A modification of Lucas and Kanade algorithm is introduced on the stage of tracking. Novel gender and age classifiers based on adaptive features and support vector machines are proposed. All the stages are united into a single system of audience analysis. The proposed software complex can find its applications in different areas, from digital signage and video surveillance to automatic systems of accident prevention and intelligent human-computer interfaces.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
“Accessibility passports” service in information environment for persons with disabilities 在资讯环境中为残障人士提供“无障碍护照”服务
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737938
Yury A. Apanasik, I. Shabalina, A. Shabaev
The paper describes development process of information environment for persons with disabilities. Introduction gives a base understanding of the project idea. The first section of the main part describes common infrastructure architecture. Services are divided on government and public. The public part is presented by various services, based on the information collected by government service. Government service is presented by information system “Accessibility passports”, which in details is described in second section of main part. The “Accessibility passports” is a service for initial collection of data about accessibility of the social infrastructure facilities for people with disabilities. In the last section of the main part presented a mathematical method for measuring level of accessibility of the social infrastructure facilities for people with disabilities. Method is based on probability theory and provide possibility for formal ranging of the social infrastructure facilities according to the level of accessibility for persons with limited mobility.
本文描述了残疾人信息环境的开发过程。引言对项目思路有一个基本的了解。主要部分的第一部分描述了通用的基础设施体系结构。服务分为政府和公众。公共部分以政府服务收集的信息为基础,由各种服务呈现。通过“无障碍护照”信息系统实现政务服务,在正文第二节中进行了详细介绍。“无障碍护照”是一项初步收集残疾人社会基础设施无障碍数据的服务。在正文的最后一节,提出了一种衡量残疾人社会基础设施可及性水平的数学方法。该方法基于概率论,并根据行动不便人士的可达性水平,为社会基础设施的正式范围提供了可能性。
{"title":"“Accessibility passports” service in information environment for persons with disabilities","authors":"Yury A. Apanasik, I. Shabalina, A. Shabaev","doi":"10.1109/FRUCT.2013.6737938","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737938","url":null,"abstract":"The paper describes development process of information environment for persons with disabilities. Introduction gives a base understanding of the project idea. The first section of the main part describes common infrastructure architecture. Services are divided on government and public. The public part is presented by various services, based on the information collected by government service. Government service is presented by information system “Accessibility passports”, which in details is described in second section of main part. The “Accessibility passports” is a service for initial collection of data about accessibility of the social infrastructure facilities for people with disabilities. In the last section of the main part presented a mathematical method for measuring level of accessibility of the social infrastructure facilities for people with disabilities. Method is based on probability theory and provide possibility for formal ranging of the social infrastructure facilities according to the level of accessibility for persons with limited mobility.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy aware power save mode management in wireless mesh networks 无线网状网络中的节能模式管理
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737954
S. Prakash, T. N. Nagabhushan, K. Krinkin
In recent times Wireless Mesh Networks (WMN) have evolved as powerful networks for most commercial applications. Many contributions have been made to enhance the performance of WMN of which the enhancement of the network lifetime remains as one of the challenging area for research. IEEE standard proposed an amendment which introduced Power Save Mode (PSM) in order to increase the lifetime of WMN. It has three modes such as Active, Light Sleep and Deep Sleep. There exist a lot of literature on increasing energy efficiency by keeping node in Deep Sleep mode when it is not involved in transmission. But current Power Save Mode has some deficiency in low Packet Delivery Ratio (PDR). This paper presents Energy Aware Power Save Mode (EAPSM) which attempt to overcome the deficiency of low PDR by triggering PSM. EAPSM consist of three modules namely, remaining energy calculator, transmission mode identifier and PSM scheduler. EAPSM schedules PSM based on the constraints such as remaining energy of a node and its participation in transmission. The proposed method includes mathematical model and algorithms which gives improved performance over conventional PSM.
近年来,无线网状网络(WMN)已发展成为大多数商业应用的强大网络。为了提高WMN的性能,人们做出了许多贡献,其中网络生存期的提高一直是具有挑战性的研究领域之一。为了延长WMN的使用寿命,IEEE标准提出了引入省电模式(PSM)的修正案。它有三种模式:主动睡眠、浅睡眠和深度睡眠。在不参与传输的情况下,通过使节点处于深度睡眠模式来提高能量效率,已有大量文献。但目前的省电模式在低分组传输率方面存在不足。本文提出了一种能量感知节能模式(EAPSM),它试图通过触发PSM来克服低PDR的不足。EAPSM由剩余能量计算器、传输模式识别器和PSM调度程序三个模块组成。EAPSM基于节点剩余能量和节点参与传输等约束来调度PSM。该方法包括数学模型和算法,使其性能优于传统的PSM。
{"title":"Energy aware power save mode management in wireless mesh networks","authors":"S. Prakash, T. N. Nagabhushan, K. Krinkin","doi":"10.1109/FRUCT.2013.6737954","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737954","url":null,"abstract":"In recent times Wireless Mesh Networks (WMN) have evolved as powerful networks for most commercial applications. Many contributions have been made to enhance the performance of WMN of which the enhancement of the network lifetime remains as one of the challenging area for research. IEEE standard proposed an amendment which introduced Power Save Mode (PSM) in order to increase the lifetime of WMN. It has three modes such as Active, Light Sleep and Deep Sleep. There exist a lot of literature on increasing energy efficiency by keeping node in Deep Sleep mode when it is not involved in transmission. But current Power Save Mode has some deficiency in low Packet Delivery Ratio (PDR). This paper presents Energy Aware Power Save Mode (EAPSM) which attempt to overcome the deficiency of low PDR by triggering PSM. EAPSM consist of three modules namely, remaining energy calculator, transmission mode identifier and PSM scheduler. EAPSM schedules PSM based on the constraints such as remaining energy of a node and its participation in transmission. The proposed method includes mathematical model and algorithms which gives improved performance over conventional PSM.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Different implementation of network level in embedded networking with QoS 具有QoS的嵌入式网络中网络层的不同实现
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737947
Nadezhda Matveeva, E. Suvorova
Some modern standards in space industry, which are being used in embedded networking designs, provide quality of service features, which are implemented by means of virtual channels. Implementations of virtual channels mechanisms are very different. Each implementation has its latency characteristics for packet flow, hardware cost and performance. These parameters depend on the virtual channels quantity in a port and switch matrix's channels quantity connected to every port (connection point). The connection point quantity can vary from one to a number of virtual channels in port. We consider three structures and implementations of network layer. In the first implementation quantity of connection points is equal to number of virtual channels in a port. In the second - one connection point. The third - one connection point with lower priority data transmission interruption. In this article we compare characteristics of different architecture implementations and structures of port controllers and switch matrix. Also we analyze and simulate proposed mechanism. We present formulas to calculate minimum and maximum data packet transmission latency and compare theoretic and simulation results. Count of virtual channels is 4 for simulation, packet length - 250, 750 bytes. Moreover router's switch matrix hardware cost is evaluated in the article.
嵌入式网络设计中采用的航天工业的一些现代标准提供了通过虚拟信道实现的服务质量特征。虚拟通道机制的实现非常不同。每种实现在数据包流、硬件成本和性能方面都有其延迟特征。这些参数取决于一个端口的虚拟通道数量和连接到每个端口(连接点)的交换矩阵的通道数量。连接点数量可以从一个到多个端口中的虚拟通道变化。我们考虑了网络层的三种结构和实现。在第一个实现中,连接点的数量等于端口中虚拟通道的数量。在第二个连接点。具有较低优先级的数据传输中断的第三个连接点。在本文中,我们比较了不同架构实现的特点以及端口控制器和开关矩阵的结构。并对所提出的机理进行了分析和仿真。我们给出了计算最小和最大数据包传输延迟的公式,并比较了理论和仿真结果。虚拟通道的计数是4模拟,数据包长度- 250,750字节。此外,本文还对路由器的交换矩阵硬件成本进行了评估。
{"title":"Different implementation of network level in embedded networking with QoS","authors":"Nadezhda Matveeva, E. Suvorova","doi":"10.1109/FRUCT.2013.6737947","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737947","url":null,"abstract":"Some modern standards in space industry, which are being used in embedded networking designs, provide quality of service features, which are implemented by means of virtual channels. Implementations of virtual channels mechanisms are very different. Each implementation has its latency characteristics for packet flow, hardware cost and performance. These parameters depend on the virtual channels quantity in a port and switch matrix's channels quantity connected to every port (connection point). The connection point quantity can vary from one to a number of virtual channels in port. We consider three structures and implementations of network layer. In the first implementation quantity of connection points is equal to number of virtual channels in a port. In the second - one connection point. The third - one connection point with lower priority data transmission interruption. In this article we compare characteristics of different architecture implementations and structures of port controllers and switch matrix. Also we analyze and simulate proposed mechanism. We present formulas to calculate minimum and maximum data packet transmission latency and compare theoretic and simulation results. Count of virtual channels is 4 for simulation, packet length - 250, 750 bytes. Moreover router's switch matrix hardware cost is evaluated in the article.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine-type communications as part of LTE-advanced technology in beyond-4G networks 超4g网络中作为lte先进技术一部分的机器类型通信
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737941
O. Dementev
Machine-Type Communications is an important part of the infrastructure of LTE. This technology connects with all the other new technologies in mobile communications. In this paper, we describe Machine-Type Communications and its relation with other technologies, e.g. heterogeneous networks and device-to-device communications. We will show a simple model of Machine Type Communications in the LTE-A network (random access procedure) and discuss M2M technology. First we describe the concept of heterogeneous networks and device-to-device communications. After that we consider the Machine-Type Communications and power consumption problem.
机机通信是LTE基础设施的重要组成部分。这项技术与移动通信中的所有其他新技术相连接。在本文中,我们描述了机器类型通信及其与其他技术的关系,例如异构网络和设备对设备通信。我们将展示LTE-A网络中机器类型通信的简单模型(随机访问过程),并讨论M2M技术。首先,我们描述了异构网络和设备对设备通信的概念。之后,我们考虑机器类型通信和功耗问题。
{"title":"Machine-type communications as part of LTE-advanced technology in beyond-4G networks","authors":"O. Dementev","doi":"10.1109/FRUCT.2013.6737941","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737941","url":null,"abstract":"Machine-Type Communications is an important part of the infrastructure of LTE. This technology connects with all the other new technologies in mobile communications. In this paper, we describe Machine-Type Communications and its relation with other technologies, e.g. heterogeneous networks and device-to-device communications. We will show a simple model of Machine Type Communications in the LTE-A network (random access procedure) and discuss M2M technology. First we describe the concept of heterogeneous networks and device-to-device communications. After that we consider the Machine-Type Communications and power consumption problem.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Solar energy harvesting strategies for portable devices such as mobile phones 用于移动电话等便携式设备的太阳能收集策略
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737955
C. Schuss, T. Rahkonen
In this paper we present strategies to harvest solar energy for mobile phones. Thereby, we discuss system structures, in which mobile phones act as either active or passive devices depending on an available communication between smartphones and their solar chargers. Both design approaches have their advantages and disadvantages, which we will elaborate in more detail in our analysis. At the moment, conventional solar chargers do not meet user expectations and need substantial improvements. We aim to establish design guidelines to make solar chargers competitive with normal chargers, which are plugged into electric sockets. As a result, we achieve appropriate recharging times for smartphones on the one hand and satisfy user requirements on the other hand.
在本文中,我们提出了为移动电话收集太阳能的策略。因此,我们讨论系统结构,其中移动电话作为有源或无源设备取决于智能手机和太阳能充电器之间的可用通信。这两种设计方法都有各自的优点和缺点,我们将在分析中更详细地阐述。目前,传统的太阳能充电器不能满足用户的期望,需要实质性的改进。我们的目标是建立设计准则,使太阳能充电器与插入电源插座的普通充电器竞争。这样一来,我们一方面实现了智能手机合适的充电时间,另一方面满足了用户的需求。
{"title":"Solar energy harvesting strategies for portable devices such as mobile phones","authors":"C. Schuss, T. Rahkonen","doi":"10.1109/FRUCT.2013.6737955","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737955","url":null,"abstract":"In this paper we present strategies to harvest solar energy for mobile phones. Thereby, we discuss system structures, in which mobile phones act as either active or passive devices depending on an available communication between smartphones and their solar chargers. Both design approaches have their advantages and disadvantages, which we will elaborate in more detail in our analysis. At the moment, conventional solar chargers do not meet user expectations and need substantial improvements. We aim to establish design guidelines to make solar chargers competitive with normal chargers, which are plugged into electric sockets. As a result, we achieve appropriate recharging times for smartphones on the one hand and satisfy user requirements on the other hand.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126010596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Undetectable interception of network traffic on LAN technologies 在局域网技术上对网络流量进行不可检测的拦截
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737961
Roman Zharinov, Dmitriy Virovlyanskiy, Yu.M. Shvedov
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move confidential data around. Safety measures can be both: hardware and software information security solutions. The cases of development and usage of custom, their own systems of automation of information processing (electronic document management, accounting, backup, etc.) are not rare, any more. In that case information security department assess the sustainability of computer networks or systems to attacks by the software, forgetting the data that being transmitted over the Ethernet (except, perhaps, Wi-Fi channel, but they only checking for cryptographically strong algorithm and a password). In current article, we propose a concept of the device for not-detectable interception (and modification) of the transmitted information through the Ethernet network.
如今,很难想象一家公司不使用互联网和内部网(LAN)来传输机密数据。安全措施可以是:硬件和软件信息安全解决方案。开发和使用自定义的、自己的自动化信息处理系统(电子文档管理、会计、备份等)的案例已经屡见不鲜。在这种情况下,信息安全部门评估计算机网络或系统对软件攻击的可持续性,忘记了通过以太网传输的数据(可能除了Wi-Fi通道,但他们只检查加密强的算法和密码)。在本文中,我们提出了一种对通过以太网传输的信息进行不可检测拦截(和修改)的设备的概念。
{"title":"Undetectable interception of network traffic on LAN technologies","authors":"Roman Zharinov, Dmitriy Virovlyanskiy, Yu.M. Shvedov","doi":"10.1109/FRUCT.2013.6737961","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737961","url":null,"abstract":"Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move confidential data around. Safety measures can be both: hardware and software information security solutions. The cases of development and usage of custom, their own systems of automation of information processing (electronic document management, accounting, backup, etc.) are not rare, any more. In that case information security department assess the sustainability of computer networks or systems to attacks by the software, forgetting the data that being transmitted over the Ethernet (except, perhaps, Wi-Fi channel, but they only checking for cryptographically strong algorithm and a password). In current article, we propose a concept of the device for not-detectable interception (and modification) of the transmitted information through the Ethernet network.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stop-words in keyphrase extraction problem 关键词提取中的停用词问题
Pub Date : 2013-11-01 DOI: 10.1109/FRUCT.2013.6737953
S. Popova, Liubov Kovriguina, D. Mouromtsev, I. Khodyrev
Keyword extraction problem is one of the most significant tasks in information retrieval. High-quality keyword extraction sufficiently influences the progress in the following subtasks of information retrieval: classification and clustering, data mining, knowledge extraction and representation, etc. The research environment has specified a layout for keyphrase extraction. However, some of the possible decisions remain uninvolved in the paradigm. In the paper the authors observe the scope of interdisciplinary methods applicable to automatic stop list feeding. The chosen method belongs to the class of experiential models. The research procedure based on this method allows to improve the quality of keyphrase extraction on the stage of candidate keyphrase building. Several ways to automatic feeding of the stop lists are proposed in the paper as well. One of them is based on provisions of lexical statistics and the results of its application to the discussed task point out the non-gaussian nature of text corpora. The second way based on usage of the Inspec train collection to the feeding of stop lists improves the quality considerably.
关键词提取问题是信息检索中最重要的任务之一。高质量的关键词提取对信息检索的分类与聚类、数据挖掘、知识提取与表示等子任务的进展有充分的影响。研究环境指定了关键字提取的布局。然而,一些可能的决策仍然不涉及范式。在本文中,作者观察了跨学科的方法适用于自动停止表进料的范围。所选择的方法属于经验模型的范畴。基于该方法的研究过程可以在候选关键词构建阶段提高关键词提取的质量。本文还提出了几种自动送料停机表的方法。其中一种是基于词汇统计的规定及其在讨论任务中的应用结果,指出了文本语料库的非高斯性质。第二种方法基于使用Inspec列车收集来馈送停车清单,大大提高了质量。
{"title":"Stop-words in keyphrase extraction problem","authors":"S. Popova, Liubov Kovriguina, D. Mouromtsev, I. Khodyrev","doi":"10.1109/FRUCT.2013.6737953","DOIUrl":"https://doi.org/10.1109/FRUCT.2013.6737953","url":null,"abstract":"Keyword extraction problem is one of the most significant tasks in information retrieval. High-quality keyword extraction sufficiently influences the progress in the following subtasks of information retrieval: classification and clustering, data mining, knowledge extraction and representation, etc. The research environment has specified a layout for keyphrase extraction. However, some of the possible decisions remain uninvolved in the paradigm. In the paper the authors observe the scope of interdisciplinary methods applicable to automatic stop list feeding. The chosen method belongs to the class of experiential models. The research procedure based on this method allows to improve the quality of keyphrase extraction on the stage of candidate keyphrase building. Several ways to automatic feeding of the stop lists are proposed in the paper as well. One of them is based on provisions of lexical statistics and the results of its application to the discussed task point out the non-gaussian nature of text corpora. The second way based on usage of the Inspec train collection to the feeding of stop lists improves the quality considerably.","PeriodicalId":169672,"journal":{"name":"14th Conference of Open Innovation Association FRUCT","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
14th Conference of Open Innovation Association FRUCT
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1