首页 > 最新文献

2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Efficient 3D placement of a UAV using particle swarm optimization 基于粒子群优化的无人机高效三维布局
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921981
Hazim Shakhatreh, Abdallah Khreishah, A. Alsarhan, Issa M. Khalil, Ahmad H. Sawalmeh, Noor Shamsiah Othman
Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stations when cellular networks go down. Prior studies on UAV-based wireless coverage typically consider an Air-to-Ground path loss model, which assumes that the users are outdoor and they are located on a 2D plane. In this paper, we propose using a single UAV to provide wireless coverage for indoor users inside a high-rise building under disaster situations (such as earthquakes or floods), when cellular networks are down. We assume that the locations of indoor users are uniformly distributed in each floor and we propose a particle swarm optimization algorithm to find an efficient 3D placement of a UAV that minimizes the total transmit power required to cover the indoor users.
当蜂窝网络出现故障时,无人驾驶飞行器(uav)可以用作空中无线基站。先前对基于无人机的无线覆盖的研究通常考虑空对地路径损失模型,该模型假设用户在室外并且位于二维平面上。在本文中,我们建议在灾害情况下(如地震或洪水),当蜂窝网络关闭时,使用单个无人机为高层建筑内的室内用户提供无线覆盖。我们假设室内用户的位置均匀分布在每个楼层,我们提出了一个粒子群优化算法,以找到一个有效的无人机的三维布局,使覆盖室内用户所需的总发射功率最小。
{"title":"Efficient 3D placement of a UAV using particle swarm optimization","authors":"Hazim Shakhatreh, Abdallah Khreishah, A. Alsarhan, Issa M. Khalil, Ahmad H. Sawalmeh, Noor Shamsiah Othman","doi":"10.1109/IACS.2017.7921981","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921981","url":null,"abstract":"Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stations when cellular networks go down. Prior studies on UAV-based wireless coverage typically consider an Air-to-Ground path loss model, which assumes that the users are outdoor and they are located on a 2D plane. In this paper, we propose using a single UAV to provide wireless coverage for indoor users inside a high-rise building under disaster situations (such as earthquakes or floods), when cellular networks are down. We assume that the locations of indoor users are uniformly distributed in each floor and we propose a particle swarm optimization algorithm to find an efficient 3D placement of a UAV that minimizes the total transmit power required to cover the indoor users.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
A brain friendly tool to facilitate research-teaching nexus: Mind maps 一个大脑友好的工具,以促进研究与教学的联系:思维导图
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921950
S. Nair, Khadija Al Farei
Memorizing and recollecting the contents of long text that has been read is a real challenge. Carrying out research, organizing and associating research ideas are equally challenging. The well-known saying that “A picture is worth a thousand words” is utilized in this teaching and learning process to empower research-minded practice among students. To accomplish this task, the concept of mind mapping is exploited. Researchers point out that visual models such as mind maps are very effective to organize one's thoughts, ideas and findings. Mind map is a graphical representation that mimics how the information flows through the neuronal cells in a way how human brain works. In short, mind map is a brain friendly tool. An attempt has been made to inspect how the concept of mind mapping can assist in expediting the learning experience of students in completing research based assessments successfully, using a mind mapping tool named Xmind.
记忆和回忆已经读过的长文本的内容是一个真正的挑战。开展研究、组织和联系研究想法同样具有挑战性。“一图胜千言”这句名言被运用在这个教学和学习的过程中,以增强学生的研究性实践能力。为了完成这项任务,我们利用了思维导图的概念。研究人员指出,思维导图等视觉模型对于组织一个人的思想、想法和发现非常有效。思维导图是一种图形表示,它模仿了信息如何在神经元细胞中流动,就像人类大脑的工作方式一样。简而言之,思维导图是一种对大脑友好的工具。人们尝试使用名为Xmind的思维导图工具来检验思维导图的概念如何帮助加快学生成功完成基于研究的评估的学习体验。
{"title":"A brain friendly tool to facilitate research-teaching nexus: Mind maps","authors":"S. Nair, Khadija Al Farei","doi":"10.1109/IACS.2017.7921950","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921950","url":null,"abstract":"Memorizing and recollecting the contents of long text that has been read is a real challenge. Carrying out research, organizing and associating research ideas are equally challenging. The well-known saying that “A picture is worth a thousand words” is utilized in this teaching and learning process to empower research-minded practice among students. To accomplish this task, the concept of mind mapping is exploited. Researchers point out that visual models such as mind maps are very effective to organize one's thoughts, ideas and findings. Mind map is a graphical representation that mimics how the information flows through the neuronal cells in a way how human brain works. In short, mind map is a brain friendly tool. An attempt has been made to inspect how the concept of mind mapping can assist in expediting the learning experience of students in completing research based assessments successfully, using a mind mapping tool named Xmind.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":" 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
3D face reconstruction and recognition using the overfeat network 基于overfeat网络的三维人脸重建与识别
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921956
Yaser Saleh, E. Edirisinghe
Although face recognition is considered a popular area of research and study, it still has few unresolved challenges, and with the appearance of devices such as the Microsoft Kinect, new possibilities for researchers were uncovered. With the goal of enhancing face recognition techniques, this paper presents a novel way to reconstruct face images in different angles, through the use of the data of one front image captured by the Kinect, using faster techniques than ever before, also, this paper utilizes a deep learning network called Overfeat, where it functioned as a feature extractor that was used on normal images and on the new 3D created images, which introduced a new application for the network. To check the capabilities of the new created images, they were used as a testing set in three main experiments. Finally, results of the experiments are presented to prove the ability of the created images to function as new data sets for face recognition; also, proving the capability of the Overfeat network, working with computer generated face images.
尽管人脸识别被认为是一个热门的研究领域,但它仍然有一些未解决的挑战,随着微软Kinect等设备的出现,研究人员发现了新的可能性。为了增强人脸识别技术,本文提出了一种新的方法来重建不同角度的人脸图像,通过使用Kinect捕获的一个正面图像的数据,使用比以往更快的技术,此外,本文利用了一个名为Overfeat的深度学习网络,它作为一个特征提取器,用于正常图像和新的3D创建的图像,这为网络引入了一个新的应用。为了检查新创建的图像的功能,它们被用作三个主要实验的测试集。最后,给出了实验结果,证明了所创建的图像可以作为人脸识别的新数据集;同时,也证明了Overfeat网络处理计算机生成的人脸图像的能力。
{"title":"3D face reconstruction and recognition using the overfeat network","authors":"Yaser Saleh, E. Edirisinghe","doi":"10.1109/IACS.2017.7921956","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921956","url":null,"abstract":"Although face recognition is considered a popular area of research and study, it still has few unresolved challenges, and with the appearance of devices such as the Microsoft Kinect, new possibilities for researchers were uncovered. With the goal of enhancing face recognition techniques, this paper presents a novel way to reconstruct face images in different angles, through the use of the data of one front image captured by the Kinect, using faster techniques than ever before, also, this paper utilizes a deep learning network called Overfeat, where it functioned as a feature extractor that was used on normal images and on the new 3D created images, which introduced a new application for the network. To check the capabilities of the new created images, they were used as a testing set in three main experiments. Finally, results of the experiments are presented to prove the ability of the created images to function as new data sets for face recognition; also, proving the capability of the Overfeat network, working with computer generated face images.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis of MCDM methods for product aspect ranking: TOPSIS and VIKOR 产品方面排序的MCDM方法TOPSIS与VIKOR的比较分析
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921949
Saif A. Ahmad Alrababah, K. H. Gan, T. Tan
The extracted product aspects (like “battery life”, “zoom”) from online customer reviews are dissimilar in their significances, some of these aspects have a great influence on the potential customer's decision likewise on the businesses' strategies for product enhancements. Supporting the probable customers with a list of the most representative product aspects will assist their purchasing decision and facilitate the comparative process among the presented products. For the firms, identifying critical product aspects creates a new perspective of product manufacturing and marketing strategies to be competitive and innovative. However the manual identification of the most representative product aspects from the huge amounts of the extracted product aspects in online reviews is a tedious and time-consuming task. Thus, ranking the extracted aspects becomes a necessity to identify the important product aspects mentioned in the customer reviews. The purpose of this study is to formulate the product aspect ranking problem as a decision making process using Multi-Criteria Decision Making (MCDM). In response, a comparative analysis between two different MCDM ranking approaches, namely; TOPSIS and VIKOR has been conducted to investigate their performances in prioritizing the most important product aspects in customer reviews. The experimental results on different product reviews demonstrate the effectiveness of these two methods in prioritizing the genuine product aspects in customer feedback.
从在线客户评论中提取的产品方面(如“电池寿命”,“变焦”)在其意义上是不同的,其中一些方面对潜在客户的决策有很大的影响,同样对企业的产品增强策略也有很大的影响。为潜在客户提供一份最具代表性的产品方面的清单,将有助于他们做出购买决策,并促进所提供产品之间的比较过程。对于公司来说,识别关键的产品方面创造了产品制造和营销策略的新视角,以具有竞争力和创新性。然而,从在线评论中提取的大量产品方面中手动识别最具代表性的产品方面是一项繁琐且耗时的任务。因此,对所提取的方面进行排序是必要的,以确定客户评论中提到的重要产品方面。本研究的目的是利用多准则决策(MCDM)将产品方面排序问题表述为一个决策过程。为此,对两种不同的MCDM排序方法进行了比较分析,即;TOPSIS和VIKOR已经进行了调查,以调查他们在客户评论中优先考虑最重要的产品方面的表现。不同产品评论的实验结果表明,这两种方法在客户反馈中优先考虑正品方面是有效的。
{"title":"Comparative analysis of MCDM methods for product aspect ranking: TOPSIS and VIKOR","authors":"Saif A. Ahmad Alrababah, K. H. Gan, T. Tan","doi":"10.1109/IACS.2017.7921949","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921949","url":null,"abstract":"The extracted product aspects (like “battery life”, “zoom”) from online customer reviews are dissimilar in their significances, some of these aspects have a great influence on the potential customer's decision likewise on the businesses' strategies for product enhancements. Supporting the probable customers with a list of the most representative product aspects will assist their purchasing decision and facilitate the comparative process among the presented products. For the firms, identifying critical product aspects creates a new perspective of product manufacturing and marketing strategies to be competitive and innovative. However the manual identification of the most representative product aspects from the huge amounts of the extracted product aspects in online reviews is a tedious and time-consuming task. Thus, ranking the extracted aspects becomes a necessity to identify the important product aspects mentioned in the customer reviews. The purpose of this study is to formulate the product aspect ranking problem as a decision making process using Multi-Criteria Decision Making (MCDM). In response, a comparative analysis between two different MCDM ranking approaches, namely; TOPSIS and VIKOR has been conducted to investigate their performances in prioritizing the most important product aspects in customer reviews. The experimental results on different product reviews demonstrate the effectiveness of these two methods in prioritizing the genuine product aspects in customer feedback.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adaptive e-learning web-based English tutor using data mining techniques and Jackson's learning styles 使用数据挖掘技术和杰克逊学习风格的自适应电子学习网络英语家教
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921951
Yahya M. Tashtoush, Majd Al-Soud, Manar Fraihat, Walaa Al-Sarayrah, M. Alsmirat
With the emanation of educational data mining field, it is being increasingly connected to a number of research areas such as adaptive and intelligent web-based tutors, intelligent educational applications and other accommodating online educational data mining systems. The applications of educational data mining takes into account the system academic aspects, the academic background, and the learner's classification. This paper proposes a new adaptive e-learning system. The proposed system integrates a well known intelligent web-based English e-learning tutor with data mining techniques. Also, the data minig techniques are used in order to cluster students' learning styles according to Jackson's learning styles. The ultimate goal of the proposed system is to determine the best teaching pattern for each learner. The proposed system can be made available through the web Everywhere as well as Every Time (EWET). It also offers adaptive facilities such as learning videos, adaptive presentations, and quizzes for the students. Moreover, it helps both teachers and students to follow the best learning process and achieve the highest academic rates. The results show that the highest student's achievement pattern is the pattern (Speaking — Reading — Grammar — Writing) with score of at least 87.4%.
随着教育数据挖掘领域的兴起,它越来越多地与自适应智能网络导师、智能教育应用和其他适应在线教育数据挖掘系统的研究领域联系在一起。教育数据挖掘的应用考虑到系统的学术方面、学术背景和学习者的分类。本文提出了一种新的自适应电子学习系统。该系统将基于网络的智能英语在线学习辅导系统与数据挖掘技术相结合。同时,运用数据挖掘技术,根据Jackson的学习风格对学生的学习风格进行聚类。该系统的最终目标是为每个学习者确定最佳的教学模式。所提出的系统可以通过网络随时随地(EWET)提供。它还为学生提供适应性设施,如学习视频、适应性演示和测验。此外,它帮助教师和学生遵循最好的学习过程,并取得最高的学习成绩。结果显示,学生成绩最高的模式为(口语-阅读-语法-写作)模式,得分不低于87.4%。
{"title":"Adaptive e-learning web-based English tutor using data mining techniques and Jackson's learning styles","authors":"Yahya M. Tashtoush, Majd Al-Soud, Manar Fraihat, Walaa Al-Sarayrah, M. Alsmirat","doi":"10.1109/IACS.2017.7921951","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921951","url":null,"abstract":"With the emanation of educational data mining field, it is being increasingly connected to a number of research areas such as adaptive and intelligent web-based tutors, intelligent educational applications and other accommodating online educational data mining systems. The applications of educational data mining takes into account the system academic aspects, the academic background, and the learner's classification. This paper proposes a new adaptive e-learning system. The proposed system integrates a well known intelligent web-based English e-learning tutor with data mining techniques. Also, the data minig techniques are used in order to cluster students' learning styles according to Jackson's learning styles. The ultimate goal of the proposed system is to determine the best teaching pattern for each learner. The proposed system can be made available through the web Everywhere as well as Every Time (EWET). It also offers adaptive facilities such as learning videos, adaptive presentations, and quizzes for the students. Moreover, it helps both teachers and students to follow the best learning process and achieve the highest academic rates. The results show that the highest student's achievement pattern is the pattern (Speaking — Reading — Grammar — Writing) with score of at least 87.4%.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
New trust metric for the RPL routing protocol RPL路由协议的新信任度量
Pub Date : 2017-04-04 DOI: 10.1109/IACS.2017.7921993
Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek, I. Romdhani
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things and mainly for the RPL (Routing Protocol for Low-power and Lossy Networks) called: Metric-based RPL Trustworthiness Scheme (MRTS). The primary aim is to enhance RPL security and deal with the trust inference problem. MRTS addresses trust issue during the construction and maintenance of routing paths from each node to the BR (Border Router). To handle this issue, we extend DIO (DODAG Information Object) message by introducing a new trust-based metric ERNT (Extended RPL Node Trustworthiness) and a new Objective Function TOF (Trust Objective Function). In fact, ERNT represents the trust values for each node within the network, and TOF demonstrates how ERNT is mapped to path cost. In MRTS all nodes collaborate to calculate ERNT by taking into account nodes' behavior including selfishness, energy, and honesty components. We implemented our scheme by extending the distributed Bellman-Ford algorithm. Evaluation results demonstrated that the new scheme improves the security of RPL.
在路由节点之间建立信任关系是建立排除受感染节点或自私节点的可靠路由进程的重要安全要求。在本文中,我们提出了一种新的物联网安全方案,主要针对RPL(低功耗和有损网络路由协议),称为基于度量的RPL可信度方案(MRTS)。主要目的是提高RPL的安全性,解决信任推理问题。MRTS解决了从每个节点到边界路由器(Border Router)的路由路径构建和维护过程中的信任问题。为了解决这个问题,我们通过引入一个新的基于信任的度量ERNT (Extended RPL Node Trustworthiness)和一个新的目标函数TOF (Trust Objective Function)来扩展DODAG信息对象(DIO)消息。事实上,ERNT表示网络中每个节点的信任值,TOF演示了ERNT如何映射到路径成本。在MRTS中,所有节点通过考虑节点的行为(包括自私、能量和诚实)来协作计算ERNT。我们通过扩展分布式Bellman-Ford算法来实现我们的方案。评价结果表明,新方案提高了RPL的安全性。
{"title":"New trust metric for the RPL routing protocol","authors":"Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek, I. Romdhani","doi":"10.1109/IACS.2017.7921993","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921993","url":null,"abstract":"Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things and mainly for the RPL (Routing Protocol for Low-power and Lossy Networks) called: Metric-based RPL Trustworthiness Scheme (MRTS). The primary aim is to enhance RPL security and deal with the trust inference problem. MRTS addresses trust issue during the construction and maintenance of routing paths from each node to the BR (Border Router). To handle this issue, we extend DIO (DODAG Information Object) message by introducing a new trust-based metric ERNT (Extended RPL Node Trustworthiness) and a new Objective Function TOF (Trust Objective Function). In fact, ERNT represents the trust values for each node within the network, and TOF demonstrates how ERNT is mapped to path cost. In MRTS all nodes collaborate to calculate ERNT by taking into account nodes' behavior including selfishness, energy, and honesty components. We implemented our scheme by extending the distributed Bellman-Ford algorithm. Evaluation results demonstrated that the new scheme improves the security of RPL.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Rogue access point localization using particle swarm optimization 基于粒子群优化的流氓接入点定位
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921985
F. Awad, Mohammad Al-Refai, Ahmad Al-qerem
Determining the location of a rogue access point is an important research problem due to the security threats it imposes. Rogue access points can be used to carry out different types of attacks such as man-in-the-middle, denial of service, and building a private channel for information theft. The main contribution of this research is a novel efficient approach to locate a rogue access points using Particle Swarm Optimization. In this paper, the received signal strength is used to estimate the distance between the access point transmitter and number of known locations around it. The set of received signal strength samples, along with their corresponding known locations, is used as an input to a customized Particle Swarm Optimization algorithm. The algorithm searches for the optimal location of the access point that matches the given sample set. The proposed approach was evaluated via simulation and was shown to estimate the location of the rogue access point quickly and precisely in different practical scenarios. Comparative analysis demonstrated that the proposed approach can prominently outperform the state-of-the-art techniques.
由于恶意接入点所带来的安全威胁,确定其位置是一个重要的研究问题。流氓接入点可用于执行不同类型的攻击,例如中间人攻击、拒绝服务攻击和构建用于信息窃取的专用通道。本研究的主要贡献是利用粒子群算法提出了一种新的有效的恶意接入点定位方法。本文使用接收到的信号强度来估计接入点发射机与其周围已知位置的数量之间的距离。接收到的信号强度样本集,以及它们对应的已知位置,被用作定制粒子群优化算法的输入。该算法搜索与给定样本集匹配的接入点的最优位置。仿真结果表明,该方法能够在不同的实际场景中快速准确地估计出非法接入点的位置。对比分析表明,所提出的方法明显优于最先进的技术。
{"title":"Rogue access point localization using particle swarm optimization","authors":"F. Awad, Mohammad Al-Refai, Ahmad Al-qerem","doi":"10.1109/IACS.2017.7921985","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921985","url":null,"abstract":"Determining the location of a rogue access point is an important research problem due to the security threats it imposes. Rogue access points can be used to carry out different types of attacks such as man-in-the-middle, denial of service, and building a private channel for information theft. The main contribution of this research is a novel efficient approach to locate a rogue access points using Particle Swarm Optimization. In this paper, the received signal strength is used to estimate the distance between the access point transmitter and number of known locations around it. The set of received signal strength samples, along with their corresponding known locations, is used as an input to a customized Particle Swarm Optimization algorithm. The algorithm searches for the optimal location of the access point that matches the given sample set. The proposed approach was evaluated via simulation and was shown to estimate the location of the rogue access point quickly and precisely in different practical scenarios. Comparative analysis demonstrated that the proposed approach can prominently outperform the state-of-the-art techniques.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance evaluation of bloom filter size in map-side and reduce-side bloom joins 图侧和约侧布兰连接中布兰过滤器尺寸的性能评价
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921965
A. Al-Badarneh, Hassan M. Najadat, Salah Rababah
Map Reduce (MP) Is an efficient programming model for processing big data. However, MR has some limitations in performing the join operation. Recent researches have been made to alleviate this problem, such as Bloom join. The idea of the Bloom join lies in constructing a Bloom filter to remove redundant records before performing the join operation. The size of the constructed filter is very critical and it should be chosen in a good manner. In this paper, we evaluate the performance of the Bloom filter size for two Bloom join algorithms, Map-side Bloom join and Reduce-side Bloom join. In our methodology, we constructed multiple Bloom filters with different sizes for two static input datasets. Our experimental results show that it is not always the best solution to construct a small or a large filter size to produce a good performance, it should be constructed based on the size of the input datasets. Also, the results show that tuning the Bloom filter size causes major effects on the join performance. Furthermore, the results show that it is recommended to choose small sizes of the Bloom filter, small enough to produce neglected false positive rate, in the implementation of the two algorithms when there is a concern about the memory. On the other hand, small to medium sizes of the Bloom filter in the Reduce-side join produce smaller elapsed time compared to the Map-side join, while large sizes produce larger elapsed time.
Map Reduce (MP)是一种高效的处理大数据的编程模型。然而,MR在执行连接操作方面有一些限制。近年来的一些研究已经缓解了这一问题,如Bloom join。Bloom连接的思想在于构造一个Bloom过滤器,以便在执行连接操作之前删除冗余记录。构建过滤器的大小是非常关键的,应该以良好的方式选择。在本文中,我们评估了两种Bloom连接算法(Map-side Bloom join和Reduce-side Bloom join)的Bloom过滤器大小的性能。在我们的方法中,我们为两个静态输入数据集构建了多个不同大小的Bloom过滤器。我们的实验结果表明,构建一个小或大的过滤器尺寸并不总是产生良好性能的最佳解决方案,它应该基于输入数据集的大小来构建。此外,结果表明,调整Bloom过滤器大小会对连接性能产生重大影响。此外,结果表明,在考虑内存的情况下,建议在两种算法的实现中选择小尺寸的布隆滤波器,小到足以产生忽略的误报率。另一方面,与map端连接相比,reduce端连接中小到中等大小的Bloom过滤器产生的运行时间更短,而大大小的Bloom过滤器产生的运行时间更长。
{"title":"Performance evaluation of bloom filter size in map-side and reduce-side bloom joins","authors":"A. Al-Badarneh, Hassan M. Najadat, Salah Rababah","doi":"10.1109/IACS.2017.7921965","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921965","url":null,"abstract":"Map Reduce (MP) Is an efficient programming model for processing big data. However, MR has some limitations in performing the join operation. Recent researches have been made to alleviate this problem, such as Bloom join. The idea of the Bloom join lies in constructing a Bloom filter to remove redundant records before performing the join operation. The size of the constructed filter is very critical and it should be chosen in a good manner. In this paper, we evaluate the performance of the Bloom filter size for two Bloom join algorithms, Map-side Bloom join and Reduce-side Bloom join. In our methodology, we constructed multiple Bloom filters with different sizes for two static input datasets. Our experimental results show that it is not always the best solution to construct a small or a large filter size to produce a good performance, it should be constructed based on the size of the input datasets. Also, the results show that tuning the Bloom filter size causes major effects on the join performance. Furthermore, the results show that it is recommended to choose small sizes of the Bloom filter, small enough to produce neglected false positive rate, in the implementation of the two algorithms when there is a concern about the memory. On the other hand, small to medium sizes of the Bloom filter in the Reduce-side join produce smaller elapsed time compared to the Map-side join, while large sizes produce larger elapsed time.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smartphone-assisted location identification algorithm for search and rescue services 用于搜索和救援服务的智能手机辅助位置识别算法
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921984
Aisha Al-Sadi, Hana' Al-Theiabat, F. Awad
Mobile device localization and location-based services have become an integral part of our lives, especially after the advent and dramatic widespread use of Smartphones. Hence, people have become very much attached to and dependent on their Smartphone in their daily lives due to the advanced features and technologies equipped within, among which are the Global Positioning System and Wi-Fi. In case of natural or man-made disasters, victims may get stuck under rubble, where the global positioning system or cellular phone signals may be either unreachable or not strong enough to make a call or provide location information with enough accuracy; bearing in mind that, mostly, the infrastructure gets dismantled during catastrophes. In such situations, locating and rescuing victims is a very tough and time-critical task. This paper presents a new algorithm that allows the Smartphones of the rescuers and the victims to seamlessly collaborate in order to estimate the locations of the victims without relying on any infrastructure. The algorithm uses both the Received Signal Strength Indicator of the Wi-Fi signals and the global positioning system location information of the rescuers' phones to estimate the locations of the victims; based on well-known mathematical communication theory models. The performance of the algorithm was evaluated via computer simulation and the results demonstrated that, under reasonable practical conditions, the victim location can be estimated relatively quickly and accurately.
移动设备本地化和基于位置的服务已经成为我们生活中不可或缺的一部分,尤其是在智能手机出现并广泛使用之后。因此,人们在日常生活中变得非常依赖智能手机,因为它配备了先进的功能和技术,其中包括全球定位系统和Wi-Fi。在自然灾害或人为灾害的情况下,受害者可能被困在瓦砾下,在那里,全球定位系统或移动电话信号可能无法到达或不够强,无法拨打电话或提供足够准确的位置信息;请记住,大多数情况下,基础设施在灾难期间会被拆除。在这种情况下,寻找和救援受害者是一项非常艰巨和时间紧迫的任务。本文提出了一种新的算法,该算法允许救援人员和受害者的智能手机无缝协作,以便在不依赖任何基础设施的情况下估计受害者的位置。该算法利用Wi-Fi信号的“接收信号强度指标”和救援人员手机的全球定位系统位置信息来估计遇害者的位置;基于著名的数学传播理论模型。通过计算机仿真对算法的性能进行了评价,结果表明,在合理的实际条件下,可以较快、准确地估计出受害者的位置。
{"title":"Smartphone-assisted location identification algorithm for search and rescue services","authors":"Aisha Al-Sadi, Hana' Al-Theiabat, F. Awad","doi":"10.1109/IACS.2017.7921984","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921984","url":null,"abstract":"Mobile device localization and location-based services have become an integral part of our lives, especially after the advent and dramatic widespread use of Smartphones. Hence, people have become very much attached to and dependent on their Smartphone in their daily lives due to the advanced features and technologies equipped within, among which are the Global Positioning System and Wi-Fi. In case of natural or man-made disasters, victims may get stuck under rubble, where the global positioning system or cellular phone signals may be either unreachable or not strong enough to make a call or provide location information with enough accuracy; bearing in mind that, mostly, the infrastructure gets dismantled during catastrophes. In such situations, locating and rescuing victims is a very tough and time-critical task. This paper presents a new algorithm that allows the Smartphones of the rescuers and the victims to seamlessly collaborate in order to estimate the locations of the victims without relying on any infrastructure. The algorithm uses both the Received Signal Strength Indicator of the Wi-Fi signals and the global positioning system location information of the rescuers' phones to estimate the locations of the victims; based on well-known mathematical communication theory models. The performance of the algorithm was evaluated via computer simulation and the results demonstrated that, under reasonable practical conditions, the victim location can be estimated relatively quickly and accurately.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploiting GPUs to accelerate white blood cells segmentation in microscopic blood images 利用gpu加速显微血液图像中的白细胞分割
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921960
Qanita Bani Baker, Khaled Balhaf
White blood cell (WBC) segmentation is one of the important topics in the medical image processing field. Several researchers used K-means clustering approach to segment WBC from blood smear microscopic images. In this paper, we use the parallelism capabilities of the Graphics Processing Units (GPUs) to accelerate the segmentation of WBC from microscopic images. We implement the K-means algorithm and the preprocess steps for WBC image segmentation in CUDA programming to take the advantages of large number of cores in GPUs. We systematically implement and evaluate the performance of WBC segmentation operations on CPU, GPUs, and CPU-GPU hybrid systems. In this work, we gained about 3X faster performance than sequential implementation achieved without affecting WBC segmentation accuracy.
白细胞(White blood cell, WBC)分割是医学图像处理领域的重要课题之一。一些研究人员使用k均值聚类方法从血液涂片显微图像中分割白细胞。在本文中,我们利用图形处理单元(gpu)的并行能力来加速从显微图像中分割WBC。为了充分利用gpu多核的优势,我们在CUDA编程中实现了K-means算法和WBC图像分割的预处理步骤。我们在CPU、gpu和CPU- gpu混合系统上系统地实现和评估了WBC分割操作的性能。在这项工作中,我们在不影响WBC分割精度的情况下获得了比顺序实现快3倍的性能。
{"title":"Exploiting GPUs to accelerate white blood cells segmentation in microscopic blood images","authors":"Qanita Bani Baker, Khaled Balhaf","doi":"10.1109/IACS.2017.7921960","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921960","url":null,"abstract":"White blood cell (WBC) segmentation is one of the important topics in the medical image processing field. Several researchers used K-means clustering approach to segment WBC from blood smear microscopic images. In this paper, we use the parallelism capabilities of the Graphics Processing Units (GPUs) to accelerate the segmentation of WBC from microscopic images. We implement the K-means algorithm and the preprocess steps for WBC image segmentation in CUDA programming to take the advantages of large number of cores in GPUs. We systematically implement and evaluate the performance of WBC segmentation operations on CPU, GPUs, and CPU-GPU hybrid systems. In this work, we gained about 3X faster performance than sequential implementation achieved without affecting WBC segmentation accuracy.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 8th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1