首页 > 最新文献

2013 International Conference on Adaptive Science and Technology最新文献

英文 中文
Statistical analysis of outage time of commercial telecommunication networks in Ghana 加纳商业电信网络中断时间的统计分析
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707520
F. Oduro-Gyimah, J. Azasoo, K. Boateng
The increasing demand by customers and the exponential growth in the telecommunication services in Ghana require a reliable telecommunication networks. To improve on the satisfaction of customers, it is incumbent on telecommunication network operators to ensure network availability. Designing resilient networks with low downtime and low recovery time is of paramount importance. This study describes a data set of daily outage measurement collected at the Network Operation Centre (NOC) from January 2012 to December 2012. A statistical analysis of the data was done to model telecommunication network availability pattern. Following the Box-Jenkins approach, Autoregressive Integrated Moving Average (ARIMA) was employed to analyze daily network outage. The study was mainly intended to forecast the telecommunication network outage duration in Ghana. The steps of model identification, parameter estimation, and diagnostic checking are performed as recommended. A model-selection strategy based on the corrected Akaike Information Criterion (AICc), Bayesian Information Criterion and Akaike Information Criterion (AIC) are adopted to determine the correct model specification. The results of the study indicate that ARIMA (2, 0, 2) model is suitable in predicting the network outage of telecommunication networks. Using five statistical indicators, namely, Root Mean Square Error (RMSE), Mean Absolute Percentage Error (MAPE), Mean Square Error (MSE), Mean Percentage Error (MPE) and Mean Absolute Error (MAE), the prediction accuracy of the proposed model is compared with the accuracies obtained with other results. The results showed that the outages and recovery time of a telecommunication network can be predicted which will help in fault management, network planning and optimization.
客户日益增长的需求和加纳电信服务的指数级增长需要一个可靠的电信网络。为提高客户的满意度,电讯网络营办商有责任确保网络的可用性。设计具有低停机时间和低恢复时间的弹性网络至关重要。本研究描述了2012年1月至2012年12月在网络运营中心(NOC)收集的每日停机测量数据集。对数据进行统计分析,建立电信网络可用性模式模型。采用Box-Jenkins方法,采用自回归综合移动平均线(ARIMA)分析每日网络中断。该研究主要是为了预测加纳电信网络中断的持续时间。模型识别、参数估计和诊断检查的步骤按照建议执行。采用基于修正的赤池信息准则(AICc)、贝叶斯信息准则和赤池信息准则(AIC)的模型选择策略来确定正确的模型规格。研究结果表明,ARIMA(2,0,2)模型适用于电信网的网络中断预测。利用均方根误差(RMSE)、平均绝对百分比误差(MAPE)、均方误差(MSE)、平均百分比误差(MPE)和平均绝对误差(MAE) 5个统计指标,将所提出模型的预测精度与其他结果的预测精度进行比较。结果表明,该方法可以预测电信网络的中断时间和恢复时间,有助于故障管理、网络规划和优化。
{"title":"Statistical analysis of outage time of commercial telecommunication networks in Ghana","authors":"F. Oduro-Gyimah, J. Azasoo, K. Boateng","doi":"10.1109/ICASTECH.2013.6707520","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707520","url":null,"abstract":"The increasing demand by customers and the exponential growth in the telecommunication services in Ghana require a reliable telecommunication networks. To improve on the satisfaction of customers, it is incumbent on telecommunication network operators to ensure network availability. Designing resilient networks with low downtime and low recovery time is of paramount importance. This study describes a data set of daily outage measurement collected at the Network Operation Centre (NOC) from January 2012 to December 2012. A statistical analysis of the data was done to model telecommunication network availability pattern. Following the Box-Jenkins approach, Autoregressive Integrated Moving Average (ARIMA) was employed to analyze daily network outage. The study was mainly intended to forecast the telecommunication network outage duration in Ghana. The steps of model identification, parameter estimation, and diagnostic checking are performed as recommended. A model-selection strategy based on the corrected Akaike Information Criterion (AICc), Bayesian Information Criterion and Akaike Information Criterion (AIC) are adopted to determine the correct model specification. The results of the study indicate that ARIMA (2, 0, 2) model is suitable in predicting the network outage of telecommunication networks. Using five statistical indicators, namely, Root Mean Square Error (RMSE), Mean Absolute Percentage Error (MAPE), Mean Square Error (MSE), Mean Percentage Error (MPE) and Mean Absolute Error (MAE), the prediction accuracy of the proposed model is compared with the accuracies obtained with other results. The results showed that the outages and recovery time of a telecommunication network can be predicted which will help in fault management, network planning and optimization.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A quality of service aware multi-level strategy for selection of optimal web service 一种基于服务质量的多级优化web服务选择策略
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707518
A. Akingbesote, M. Adigun, J. Oladosu, E. Jembere
The Utility-Infrastructure providers serve as an intermediary between the service providers and the service consumers. The challenge of selecting optimal Web service by these service providers based on service consumer's preference using aggregate, score or degree has been tackled to a certain extent where optimal service selection is done in the context of subjective criterion alone. One major challenge being faced by these providers is the selection of optimal Web service when there are ties with the used criterion where the performance alternatives have the same score. We propose a Quality of Service aware multi-level strategy for selection of optimal Web services for Utility-Infrastructure providers. To get optimal Web service selection, the service consumer's Quality of Service preference is compared with the Web service Quality of Service offerings. The offering that best matches the Quality of Service preference is taken to be the optimal one. We consider two alternative e-Market services for our Quality of Service driven service selection: the Information services and the Complex services. We concentrate on the Information services and our model uses the non deterministic Quality of Service metrics. In our experiment, we use Web service data set Quality of Service information as our input and the experimental results show that our proposed multilevel strategy model can satisfy service consumers' request based on our non-functional requirements.
公用事业基础设施提供者充当服务提供者和服务使用者之间的中介。这些服务提供者基于服务消费者的偏好(使用集合、分数或程度)选择最优Web服务的挑战已经在一定程度上得到了解决,其中最优服务选择仅在主观标准上下文中进行。这些提供者面临的一个主要挑战是,当使用的标准与性能备选方案得分相同时,如何选择最优Web服务。我们提出了一种服务质量感知的多层次策略,用于为公用事业基础设施提供商选择最佳Web服务。为了获得最佳的Web服务选择,将服务使用者的服务质量偏好与Web服务质量提供进行比较。与服务质量偏好最匹配的产品被认为是最优产品。我们考虑了两种可供选择的电子市场服务,即资讯服务和综合服务。我们将重点放在信息服务上,我们的模型使用不确定的服务质量度量。在我们的实验中,我们使用Web服务数据集服务质量信息作为输入,实验结果表明,我们提出的多层次策略模型能够满足基于我们的非功能需求的服务消费者的请求。
{"title":"A quality of service aware multi-level strategy for selection of optimal web service","authors":"A. Akingbesote, M. Adigun, J. Oladosu, E. Jembere","doi":"10.1109/ICASTECH.2013.6707518","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707518","url":null,"abstract":"The Utility-Infrastructure providers serve as an intermediary between the service providers and the service consumers. The challenge of selecting optimal Web service by these service providers based on service consumer's preference using aggregate, score or degree has been tackled to a certain extent where optimal service selection is done in the context of subjective criterion alone. One major challenge being faced by these providers is the selection of optimal Web service when there are ties with the used criterion where the performance alternatives have the same score. We propose a Quality of Service aware multi-level strategy for selection of optimal Web services for Utility-Infrastructure providers. To get optimal Web service selection, the service consumer's Quality of Service preference is compared with the Web service Quality of Service offerings. The offering that best matches the Quality of Service preference is taken to be the optimal one. We consider two alternative e-Market services for our Quality of Service driven service selection: the Information services and the Complex services. We concentrate on the Information services and our model uses the non deterministic Quality of Service metrics. In our experiment, we use Web service data set Quality of Service information as our input and the experimental results show that our proposed multilevel strategy model can satisfy service consumers' request based on our non-functional requirements.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Gender classification using face recognition 基于人脸识别的性别分类
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707489
Terishka Bissoon, Serestina Viriri
This paper addresses the issue of gender classification using the method of Principal Component Analysis (PCA) for face recognition and classification of human faces. The use of the PCA algorithm has a maximum success rate of 82%. The gender classification system is then improved by using the Linear Discriminant Analysis (LDA. This algorithm has a machine-learning framework by which it trains on a database and using this trained environment to predict the outcome of other images. The classification is restricted to two classes - male and female. Upon using LDA, the success rate increased to approximately 85%. The database used in this paper for the training and testing of images is called the FERET database.
本文研究了基于主成分分析(PCA)的人脸识别和人脸分类的性别分类问题。使用PCA算法的最大成功率为82%。然后利用线性判别分析(LDA)对性别分类系统进行改进。该算法有一个机器学习框架,通过该框架,它在数据库上进行训练,并使用这个训练过的环境来预测其他图像的结果。分类仅限于两类——男性和女性。使用LDA后,成功率提高到约85%。本文中用于图像训练和测试的数据库称为FERET数据库。
{"title":"Gender classification using face recognition","authors":"Terishka Bissoon, Serestina Viriri","doi":"10.1109/ICASTECH.2013.6707489","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707489","url":null,"abstract":"This paper addresses the issue of gender classification using the method of Principal Component Analysis (PCA) for face recognition and classification of human faces. The use of the PCA algorithm has a maximum success rate of 82%. The gender classification system is then improved by using the Linear Discriminant Analysis (LDA. This algorithm has a machine-learning framework by which it trains on a database and using this trained environment to predict the outcome of other images. The classification is restricted to two classes - male and female. Upon using LDA, the success rate increased to approximately 85%. The database used in this paper for the training and testing of images is called the FERET database.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123934073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A new hybrid asymmetric key-exchange and visual cryptographic algorithm for securing digital images 一种新的用于数字图像安全的混合非对称密钥交换和视觉加密算法
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707497
Q. Kester, Laurent Nana, A. Pascu
In today's cyber world where interception of data by third parties is very common, there is a demanding need for encryption of data via secured and unsecured communication networks. Sensitive digital images stored in databases, such as in the cloud, need to be encrypted. This paper proposed a hybrid method of encryption of digital images based on asymmetric encryption algorithm and a visual cryptographic algorithm. The encryption key used was based on a public key-exchange algorithm and the algorithm was implemented using MATLAB on an mxn image size.
在当今的网络世界中,第三方拦截数据的情况非常普遍,因此需要通过安全和不安全的通信网络对数据进行加密。存储在数据库(如云)中的敏感数字图像需要加密。提出了一种基于非对称加密算法和视觉加密算法的数字图像混合加密方法。使用的加密密钥基于公钥交换算法,该算法在mxn大小的图像上使用MATLAB实现。
{"title":"A new hybrid asymmetric key-exchange and visual cryptographic algorithm for securing digital images","authors":"Q. Kester, Laurent Nana, A. Pascu","doi":"10.1109/ICASTECH.2013.6707497","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707497","url":null,"abstract":"In today's cyber world where interception of data by third parties is very common, there is a demanding need for encryption of data via secured and unsecured communication networks. Sensitive digital images stored in databases, such as in the cloud, need to be encrypted. This paper proposed a hybrid method of encryption of digital images based on asymmetric encryption algorithm and a visual cryptographic algorithm. The encryption key used was based on a public key-exchange algorithm and the algorithm was implemented using MATLAB on an mxn image size.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"1815 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Developing a virtualised testbed environment in preparation for testing of network based attacks 开发一个虚拟的测试平台环境,准备测试基于网络的攻击
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707509
Renier van Heerden, H. Pieterse, I. Burke, B. Irwin
Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphereESXi environment which is able to simulate: thirty workstations, ten servers, three distinct network segments and the accompanying network traffic. The VSphere environment provided added benefits, such as the ability to pause, restart and snapshot virtual computers. These abilities enabled the authors to reset the simulation environment before each test and mitigated against the damage that an attack potentially inflicts on the test network. Without simulated network traffic, the virtualised network was too sterile. This resulted in any network event being a simple task to detect, making network traffic simulation a requirement for an event detection test bed. Five main kinds of traffic were simulated: Web browsing, File transfer, e-mail, version control and Intranet File traffic. The simulated traffic volumes were pseudo randomised to represent differing temporal patterns. By building a virtualised network with simulated traffic we were able to test IDS' and other network attack detection sensors in a much more realistic environment before moving it to a live network. The goal of this paper is to present a virtualised testbedenvironmentin which network attacks can safely be tested.
计算机网络攻击是难以模拟的,因为它们可能会对现有网络造成破坏,并且模拟一个有用的网络所需的复杂性。我们在vSphereESXi环境中构建了一个虚拟网络,该网络能够模拟:30个工作站,10台服务器,三个不同的网段和相应的网络流量。VSphere环境提供了额外的好处,例如暂停、重启和快照虚拟计算机的能力。这些能力使作者能够在每次测试之前重置模拟环境,并减轻攻击对测试网络造成的潜在损害。如果没有模拟的网络流量,虚拟化的网络就会变得过于贫瘠。这导致任何网络事件都是一个简单的检测任务,使得网络流量模拟成为事件检测测试平台的需求。模拟了五种主要的流量:网页浏览、文件传输、电子邮件、版本控制和Intranet文件流量。模拟的交通量是伪随机的,以表示不同的时间模式。通过构建一个带有模拟流量的虚拟网络,我们能够在将IDS和其他网络攻击检测传感器移动到实际网络之前,在一个更现实的环境中测试IDS和其他网络攻击检测传感器。本文的目标是提供一个虚拟的测试平台环境,可以安全地测试网络攻击。
{"title":"Developing a virtualised testbed environment in preparation for testing of network based attacks","authors":"Renier van Heerden, H. Pieterse, I. Burke, B. Irwin","doi":"10.1109/ICASTECH.2013.6707509","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707509","url":null,"abstract":"Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphereESXi environment which is able to simulate: thirty workstations, ten servers, three distinct network segments and the accompanying network traffic. The VSphere environment provided added benefits, such as the ability to pause, restart and snapshot virtual computers. These abilities enabled the authors to reset the simulation environment before each test and mitigated against the damage that an attack potentially inflicts on the test network. Without simulated network traffic, the virtualised network was too sterile. This resulted in any network event being a simple task to detect, making network traffic simulation a requirement for an event detection test bed. Five main kinds of traffic were simulated: Web browsing, File transfer, e-mail, version control and Intranet File traffic. The simulated traffic volumes were pseudo randomised to represent differing temporal patterns. By building a virtualised network with simulated traffic we were able to test IDS' and other network attack detection sensors in a much more realistic environment before moving it to a live network. The goal of this paper is to present a virtualised testbedenvironmentin which network attacks can safely be tested.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Utilising cognitive work analysis for the design and evaluation of command and control user interfaces 利用认知工作分析来设计和评估命令和控制用户界面
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707495
Eugene Gous
This paper reports on the design and evaluation of distributed net-centric command and control user interfaces for future air defence operations. The design was based on the Cognitive Work Analysis framework to identify the required capabilities and constraints in which the system would operate. The framework comprises of five phases that are populated using subject matter expert inputs. Each phase highlights a different facet of the work domain. Of particular interest is the final phase - Worker Competency Analysis - that is based on Rasmussen's human performance model. The model is used to capture the skills-, rules- and the knowledge-levels required by the operator. The author suggest that the model closely resembles the three levels of Situation Awareness - perception, comprehension and projection - and can be used to identify the measures with which to evaluate the developed user interface using Situation Awareness Evaluation techniques. The results are then used to scrutinise the conformance of the user interface design to its intended purpose.
本文报道了面向未来防空作战的分布式以网络为中心的指挥控制用户界面的设计与评估。该设计基于认知工作分析框架,以确定系统运行所需的功能和约束。该框架由五个阶段组成,这些阶段使用主题专家输入进行填充。每个阶段都突出了工作领域的不同方面。特别有趣的是最后一个阶段——工人能力分析——这是基于拉斯穆森的人类绩效模型。该模型用于捕获操作员所需的技能、规则和知识水平。作者认为,该模型非常类似于态势感知的三个层次——感知、理解和投射——并且可以用来确定使用态势感知评估技术来评估开发的用户界面的措施。然后使用结果来仔细检查用户界面设计是否符合其预期目的。
{"title":"Utilising cognitive work analysis for the design and evaluation of command and control user interfaces","authors":"Eugene Gous","doi":"10.1109/ICASTECH.2013.6707495","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707495","url":null,"abstract":"This paper reports on the design and evaluation of distributed net-centric command and control user interfaces for future air defence operations. The design was based on the Cognitive Work Analysis framework to identify the required capabilities and constraints in which the system would operate. The framework comprises of five phases that are populated using subject matter expert inputs. Each phase highlights a different facet of the work domain. Of particular interest is the final phase - Worker Competency Analysis - that is based on Rasmussen's human performance model. The model is used to capture the skills-, rules- and the knowledge-levels required by the operator. The author suggest that the model closely resembles the three levels of Situation Awareness - perception, comprehension and projection - and can be used to identify the measures with which to evaluate the developed user interface using Situation Awareness Evaluation techniques. The results are then used to scrutinise the conformance of the user interface design to its intended purpose.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Animal identification based on footprint recognition 基于足迹识别的动物识别
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707488
Mohammed Nazir Alli, Serestina Viriri
Animals can be identified using their footprints. Several features contained within an animal footprint can be used to aid in the identification of an animal. Amongst these features, the most common and most used by humans to manually identify the animal is the number and size of blobs in the footprint. Using image processing techniques an algorithm was created to segment and extract the best possible representation of the footprint which varied across color. Connected Components was then used to count the number of blobs contained within the footprint and measure the size of each blob. Using this information alone, it was found that a footprint could accurately be classified as either hoofed, padded or full print. Finally morphological feature extraction techniques were investigated to fully classify the footprint. The system implemented boasted a 97% accuracy rate.
动物可以通过它们的脚印来识别。动物脚印中包含的几个特征可以用来帮助识别动物。在这些特征中,人类手动识别动物最常见和最常用的是脚印中斑点的数量和大小。利用图像处理技术,创建了一种算法来分割和提取不同颜色的足迹的最佳表示。然后使用Connected Components计算占用空间中包含的blob的数量,并测量每个blob的大小。仅使用这些信息,就可以准确地将脚印分类为有蹄脚印、填充脚印或完整脚印。最后,研究了形态学特征提取技术,对足迹进行了全面分类。该系统实现了97%的准确率。
{"title":"Animal identification based on footprint recognition","authors":"Mohammed Nazir Alli, Serestina Viriri","doi":"10.1109/ICASTECH.2013.6707488","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707488","url":null,"abstract":"Animals can be identified using their footprints. Several features contained within an animal footprint can be used to aid in the identification of an animal. Amongst these features, the most common and most used by humans to manually identify the animal is the number and size of blobs in the footprint. Using image processing techniques an algorithm was created to segment and extract the best possible representation of the footprint which varied across color. Connected Components was then used to count the number of blobs contained within the footprint and measure the size of each blob. Using this information alone, it was found that a footprint could accurately be classified as either hoofed, padded or full print. Finally morphological feature extraction techniques were investigated to fully classify the footprint. The system implemented boasted a 97% accuracy rate.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison of routing protocols performance using wireless mesh network simulation and testbed 基于无线网状网络仿真与实验平台的路由协议性能比较
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707507
O. Oki, P. Mudali, J. Oladosu, M. Adigun
Wireless Mesh Network (WMN) has received considerable attention as a means to achieve connectivity in community and commercial networks. Protocols at different stack layers have varying effects both on the energy consumption and the general performance of WMN backbone nodes. Previous studies have shown that, simulations have often been used to obtain protocol performance data, but simulation results are at best an abstraction of the real world network performance. Thus, simulations often provide an unrealistic measure of protocol performance and testbed-based studies are proving more realistic. This paper analyses the performance of AODV and OLSR routing protocols in WMN using both simulation and indoor testbed. Although, the simulation and testbed results aligned with each other for Packet delivery ratio and average throughput, but the magnitude of the difference between the two results is wide. However, the simulation result contradicts that of the testbed for the lifetime. Based on the results of this study, we argue that simulation results only give a rough estimate of the real world network performance. Hence, whenever it is feasible, validating simulation results using a testbed is highly recommended in order to improve our understanding of protocol performance.
无线网状网络(WMN)作为实现社区和商用网络连通性的一种手段,受到了广泛的关注。不同堆叠层的协议对WMN骨干节点的能耗和总体性能的影响是不同的。以往的研究表明,仿真通常用于获取协议性能数据,但仿真结果充其量是对真实世界网络性能的抽象。因此,模拟通常提供不现实的协议性能度量,而基于测试平台的研究被证明更为现实。本文采用仿真和室内实验两种方法对WMN中AODV和OLSR路由协议的性能进行了分析。虽然在分组传送率和平均吞吐量方面,仿真结果与试验台结果基本一致,但两者之间的差异幅度较大。然而,仿真结果与试验台的寿命结果相矛盾。基于本研究的结果,我们认为仿真结果只给出了对真实世界网络性能的粗略估计。因此,只要可行,强烈建议使用测试平台验证模拟结果,以提高我们对协议性能的理解。
{"title":"Comparison of routing protocols performance using wireless mesh network simulation and testbed","authors":"O. Oki, P. Mudali, J. Oladosu, M. Adigun","doi":"10.1109/ICASTECH.2013.6707507","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707507","url":null,"abstract":"Wireless Mesh Network (WMN) has received considerable attention as a means to achieve connectivity in community and commercial networks. Protocols at different stack layers have varying effects both on the energy consumption and the general performance of WMN backbone nodes. Previous studies have shown that, simulations have often been used to obtain protocol performance data, but simulation results are at best an abstraction of the real world network performance. Thus, simulations often provide an unrealistic measure of protocol performance and testbed-based studies are proving more realistic. This paper analyses the performance of AODV and OLSR routing protocols in WMN using both simulation and indoor testbed. Although, the simulation and testbed results aligned with each other for Packet delivery ratio and average throughput, but the magnitude of the difference between the two results is wide. However, the simulation result contradicts that of the testbed for the lifetime. Based on the results of this study, we argue that simulation results only give a rough estimate of the real world network performance. Hence, whenever it is feasible, validating simulation results using a testbed is highly recommended in order to improve our understanding of protocol performance.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The case for cyber counterintelligence 网络反间谍的案例
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707493
P. Duvenage, S. von Solms
A paradigmatic shift in thinking on cyber security in the 21st century is gaining momentum. This turn in thinking is rooted in a widening acknowledgement that conventional cyber security solutions no longer offer adequate protection in the face of threats posed by role players such as nation states, criminal syndicates, corporate spies, terrorists, hacktivists and rogue individuals. It is clear that securing cyber space depends not only on raising the bar in respect of existing measures, but also on taking proactive action focussing on threat agents. Views are, however, not so clear on what such proactive action should entail and how this should be integrated with conventional cyber security measures. Similarly, conceptual clarity is lacking on the configuration of an integrated response congruent with the challenges posed by the fast changing threatscape. The paper examines firstly the cyber threatscape and the challenges this poses. It proceeds with advancing cyber counterintelligence as a conceptual and practicable option to meeting cyber security challenges coherently and proactively. Although cyber counterintelligence is not a novel concept, it is academically under-explored as open-source literature on this subject is relatively sparse. In particular, the quest for an integrated conceptual model for cyber counterintelligence is still in its infancy. This paper does not purport to offer a refined model, but endeavours to propose a few contours useful to its construction. Compiled for a wide target audience that includes business professionals and academia, the paper is underpinned by principles and constructs derived from statutory counterintelligence theory and practice.
21世纪网络安全思想的范式转变正在加速。这种思维转变的根源在于,人们越来越认识到,面对民族国家、犯罪集团、企业间谍、恐怖分子、黑客活动分子和流氓个人等角色构成的威胁,传统的网络安全解决方案不再能提供足够的保护。显然,确保网络空间安全不仅取决于提高现有措施的标准,还取决于采取以威胁因素为重点的主动行动。然而,对于这种主动行动应该包括什么,以及如何将其与传统的网络安全措施相结合,人们的看法并不那么明确。同样,在与快速变化的威胁形势所带来的挑战相一致的综合反应的配置方面,概念上也缺乏明确性。本文首先探讨了网络威胁及其带来的挑战。它继续推进网络反情报,将其作为一种概念和可行的选择,以连贯和主动地应对网络安全挑战。尽管网络反间谍不是一个新颖的概念,但由于关于这一主题的开源文献相对较少,学术界对其的探索不足。特别是,对网络反情报综合概念模型的探索仍处于起步阶段。本文并不打算提供一个精细的模型,而是努力提出一些对其构建有用的轮廓。该文件面向包括商业专业人士和学术界在内的广泛目标受众,以法定反间谍理论和实践衍生的原则和概念为基础。
{"title":"The case for cyber counterintelligence","authors":"P. Duvenage, S. von Solms","doi":"10.1109/ICASTECH.2013.6707493","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707493","url":null,"abstract":"A paradigmatic shift in thinking on cyber security in the 21st century is gaining momentum. This turn in thinking is rooted in a widening acknowledgement that conventional cyber security solutions no longer offer adequate protection in the face of threats posed by role players such as nation states, criminal syndicates, corporate spies, terrorists, hacktivists and rogue individuals. It is clear that securing cyber space depends not only on raising the bar in respect of existing measures, but also on taking proactive action focussing on threat agents. Views are, however, not so clear on what such proactive action should entail and how this should be integrated with conventional cyber security measures. Similarly, conceptual clarity is lacking on the configuration of an integrated response congruent with the challenges posed by the fast changing threatscape. The paper examines firstly the cyber threatscape and the challenges this poses. It proceeds with advancing cyber counterintelligence as a conceptual and practicable option to meeting cyber security challenges coherently and proactively. Although cyber counterintelligence is not a novel concept, it is academically under-explored as open-source literature on this subject is relatively sparse. In particular, the quest for an integrated conceptual model for cyber counterintelligence is still in its infancy. This paper does not purport to offer a refined model, but endeavours to propose a few contours useful to its construction. Compiled for a wide target audience that includes business professionals and academia, the paper is underpinned by principles and constructs derived from statutory counterintelligence theory and practice.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cloud-based security mechanisms for critical information infrastructure protection 基于云的关键信息基础设施安全保护机制
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707515
B. van Niekerk, Pierre Jacobs
In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.
本文讨论了基于云的安全服务(SECaaS)在关键信息基础设施保护(CIIP)中的适用性。提供基于云的安全服务背景。讨论了这些服务对CIIP的适用性,并得出结论,混合云和传统解决方案是最好的。提出了一种以这种方式为关键基础设施提供基于云的保护的模型。
{"title":"Cloud-based security mechanisms for critical information infrastructure protection","authors":"B. van Niekerk, Pierre Jacobs","doi":"10.1109/ICASTECH.2013.6707515","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707515","url":null,"abstract":"In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2013 International Conference on Adaptive Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1