首页 > 最新文献

2019 2nd International Conference on Data Intelligence and Security (ICDIS)最新文献

英文 中文
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing 云计算环境下Ceph分布式文件系统双I/O性能的新方法
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00018
Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao
Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.
块存储是IaaS (infrastructure as a service)云计算系统中必不可少的资源。它用于存储虚拟机的映像。它提供持久的存储服务,即使虚拟机是关闭的。分布式存储系统用于提供IaaS中的块存储服务,如Amazon EBS、Cinder、Ceph、Sheepdog等。Ceph作为OpenStack平台的后端块存储服务被广泛使用。它将块设备转换成具有相同大小的对象,并保存在本地文件系统中。在很多情况下,Ceph提供的块设备的性能只有硬盘的30%。影响Ceph性能的关键问题之一是容错的三个副本。但我们的研究发现,副本并不是降低性能的真正原因。在本文中,我们提出了一种加速IO操作的新方法。实验结果表明,通过使用我们的存储引擎,Ceph在大多数情况下可以提供比硬盘更快的IO性能。我们的新存储引擎提供的容量是原来的三倍以上。
{"title":"A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing","authors":"Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao","doi":"10.1109/ICDIS.2019.00018","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00018","url":null,"abstract":"Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired 视障人士寻路和避障的RNN和CNN
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00041
Faruk Ahmed, M. Mahmud, M. Yeasin
Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.
无论对视力受损的人还是视力正常的人来说,寻路都至关重要。如果重复使用,已经导航的方式对视障人士很有用。在这项研究中,我们提出了一个辅助技术解决方案,可重复使用的寻路与避障的视障人士。我们训练了一个递归神经网络(RNN)模型来预测导航活动。这些活动被用作可重用方式的构建块。采用微调卷积神经网络(CNN)模型进行障碍物检测。这两种模型都包含在智能手机应用程序中,以构建、共享和重用导航方式。评估表明,使用该应用程序,视障人士能够在没有外界帮助的情况下精确导航95%。
{"title":"RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired","authors":"Faruk Ahmed, M. Mahmud, M. Yeasin","doi":"10.1109/ICDIS.2019.00041","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00041","url":null,"abstract":"Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm 基于遗传算法的多相流最优闭合关系选择
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00017
S. Mohammadi, M. Papa, E. Pereyra, C. Sarica
A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.
采用遗传算法来确定最佳的封闭关系集,以模拟管道中的多相流行为。这种建模通常是通过使用质量和动量守恒方程的机械方法来完成的。此外,需要一组闭合关系来完成基于实验数据建立的方程组。由于可能存在大量闭包,搜索空间的大小受到组合爆炸问题的影响,通常使用主题专家来选择最佳解决方案。本文提出了一种用R语言实现的遗传算法,用于实现该过程的自动化。初步结果表明,它有能力在合理的时间内选择与人类专家一样好或更好的组合。
{"title":"Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm","authors":"S. Mohammadi, M. Papa, E. Pereyra, C. Sarica","doi":"10.1109/ICDIS.2019.00017","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00017","url":null,"abstract":"A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack 网络攻击下智能电表数据采集的安全完整性
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00009
Sanjeev Kumar, Harsh Kumar, G. Gunnam
Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.
网络安全一直是电力公司部署智能电表和智能电网技术时最关心的问题。尽管智能电网技术和智能电表具有众所周知的优势,但目前尚不清楚网络攻击如何以及在多大程度上妨碍智能电表的运行,以及从客户现场收集有关用电量的远程数据。为了了解这些问题,我们在网络安全实验室的受控实验室环境中进行了实验,测试了一个商业级智能电表。在本文中,我们介绍了我们对商业级智能电表的调查结果,并测量了智能电表在网络攻击条件下的运行完整性。
{"title":"Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack","authors":"Sanjeev Kumar, Harsh Kumar, G. Gunnam","doi":"10.1109/ICDIS.2019.00009","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00009","url":null,"abstract":"Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System 基于modbus的油气井监测系统异常检测传感器
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00008
Xinchi He, Ethan Robards, R. Gamble, M. Papa
Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.
及时发现油气井网络流量异常对于支持作业至关重要。本文介绍了一种专门设计用于现有井监测基础设施的网络传感器。实时提取网络流量和流量特征,并与预设平均值和移动平均值进行比较,以检测和报告异常情况。一个原型已经使用Modbus协议和网络流量进行了几个月的测试。为了避免对生产环境的潜在影响,脚本捕获网络数据包,然后在IMUNES网络模拟器上重播这些数据包。初步结果已经确定了在生产环境中进行异常检测的有用度量。
{"title":"Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System","authors":"Xinchi He, Ethan Robards, R. Gamble, M. Papa","doi":"10.1109/ICDIS.2019.00008","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00008","url":null,"abstract":"Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols 将控制原语映射到SCADA通信协议的平台无关语言
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00020
Zachary Hill, J. Hale, M. Papa, P. Hawrylak
Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.
模拟是开发和测试SCADA系统安全解决方案的有用工具。然而,这些模拟可能需要进行重大修改,以反映系统中提出的更改,例如寄存器结构或通信协议的更改。本文提出了一种规范语言,通过允许在仿真代码之外修改数据包和寄存器结构等关键细节,可以很容易地修改仿真中的通信协议。
{"title":"Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols","authors":"Zachary Hill, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00020","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00020","url":null,"abstract":"Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Mix Column Computation of Cryptographic AES 改进的加密AES混合列计算
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00042
Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar
With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.
随着当今网络和联网设备的发展和扩大,信息安全问题日益受到关注。机密性是数字通信系统网络安全的焦点之一,其中大数据块通过带有密钥的加密算法,从而增加了输出密文的安全性和复杂性。在过去的几年中,在数据加密过程中开发和使用了多种安全算法,如数据加密标准DES (data encryption Standard)、三重数据加密标准3DES (Triple data encryption Standard),以及目前由美国国家标准与技术研究院(NIST)指定的高级加密标准AES (Advanced encryption Standard)。AES是一种对称加密算法,其最小输入数据块大小为128位,在几轮中经历一系列排列、替换和数字逻辑操作。加密算法在密文复杂度、所需硬件存储分配和执行时间等方面一直在不断改进。现场可编程门阵列(FPGA)是加密算法实现的硬件替代方案,因为尽管其中的逻辑单元是固定的,但它们之间的功能和互连是基于用户的设计,允许改进。研究重点是在Altera Cyclone IV FPGA上使用Intel Quartus II软件和Verilog硬件描述语言开发和分析有效的AES-128 Mix Columns算法实现,该算法用于数据块加密轮。
{"title":"Improved Mix Column Computation of Cryptographic AES","authors":"Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar","doi":"10.1109/ICDIS.2019.00042","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00042","url":null,"abstract":"With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physiological Measurement for Emotion Recognition in Virtual Reality 虚拟现实中情感识别的生理测量
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00028
Lee B. Hinkle, K. Khoshhal, V. Metsis
In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.
在这项工作中,使用各种非侵入性传感器来收集受试者与虚拟现实环境交互时的生理数据。收集到的数据用于识别受试者对刺激的情绪反应。讨论了数据收集和标签过程中面临的缺点和挑战,并提出了解决方案。采用机器学习方法进行情绪分类。我们的实验表明,特征提取是分类过程中至关重要的一步。提出了一种可以从各种生理生物信号中提取的通用特征集合。实验结果表明,与传统的特定领域特征相比,本文提出的特征集具有更好的情感分类精度。
{"title":"Physiological Measurement for Emotion Recognition in Virtual Reality","authors":"Lee B. Hinkle, K. Khoshhal, V. Metsis","doi":"10.1109/ICDIS.2019.00028","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00028","url":null,"abstract":"In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Dependencies Preserving Shuffle in Relational Database 关系数据库中的数据依赖保持Shuffle
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00034
Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas
This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.
本文解决了数据库洗牌算法不能保持数据依赖关系的问题。我们介绍了一种在数据库洗牌过程中保留功能依赖关系和数据驱动关联的方法。我们使用Boyce-Codd范式(BCNF)分解来保持功能依赖。给定一个非BCNF形式的关系R,我们建议将R分解为BCNF关系R1,…Rn,。每个Ri (i = 1,…,n)被洗牌,然后重新连接以创建洗牌关系。我们的方法保证了无损性并保留了功能依赖性。数据驱动的关联也可能在数据库变换期间丢失。为此,我们生成关联属性的传递闭包。我们需要将相关的属性混在一起。我们还提出了我们的理论和实证结果。
{"title":"Data Dependencies Preserving Shuffle in Relational Database","authors":"Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas","doi":"10.1109/ICDIS.2019.00034","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00034","url":null,"abstract":"This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on the Impacts of Quantum Computers on Information Security 量子计算机对信息安全的影响综述
Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00039
Maryann Njorbuenwu, Bobby Swar, P. Zavarsky
Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.
量子计算机与传统计算机不同,因为与使用和处理比特(0或1)信息的传统计算机不同,量子计算机中的信息单位是量子比特,或量子位,它可以同时表示除1和0之外的其他状态。被称为叠加和纠缠的附加状态促进了量子计算机惊人的处理速度。量子计算机的出现在信息安全的各个领域引起了许多关注。本文采用文献调查的方法来阐明量子计算机对信息安全的积极和消极影响。本文通过检查NIST SP 800-53 Rev. 5控制目录中所有推荐的信息安全和隐私控制,进一步解决了量子计算机将对信息安全产生负面影响的担忧。此外,本文简要概述了最近在抗量子标准方面的工作。
{"title":"A Survey on the Impacts of Quantum Computers on Information Security","authors":"Maryann Njorbuenwu, Bobby Swar, P. Zavarsky","doi":"10.1109/ICDIS.2019.00039","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00039","url":null,"abstract":"Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 2nd International Conference on Data Intelligence and Security (ICDIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1