Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00009
A. Chemchem, F. Alin, M. Krajecki
Over the last few years, machine learning and data mining methods (MLDM) are constantly evolving, in order to accelerate the process of knowledge discovery from data (KDD). Today's challenge is to select only the most relevant knowledge from those extracted. The present paper is directed to these purposes, by developing a new concept of knowledge mining for meta-knowledge extraction, and extending the most popular machine learning methods to extract meta-models. This new concept of knowledge classification is integrated on the cognitive agent architecture, so as to speed-up its inference process. With this new architecture, the agent will be able to select only the actionable rule class, instead of trying to infer its whole rule base exhaustively.
{"title":"Deep Learning and Data Mining Classification through the Intelligent Agent Reasoning","authors":"A. Chemchem, F. Alin, M. Krajecki","doi":"10.1109/W-FICLOUD.2018.00009","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00009","url":null,"abstract":"Over the last few years, machine learning and data mining methods (MLDM) are constantly evolving, in order to accelerate the process of knowledge discovery from data (KDD). Today's challenge is to select only the most relevant knowledge from those extracted. The present paper is directed to these purposes, by developing a new concept of knowledge mining for meta-knowledge extraction, and extending the most popular machine learning methods to extract meta-models. This new concept of knowledge classification is integrated on the cognitive agent architecture, so as to speed-up its inference process. With this new architecture, the agent will be able to select only the actionable rule class, instead of trying to infer its whole rule base exhaustively.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00032
S. Abdreshova, T. Golubeva, S. Konshin, Shabden Bahtaev, B. Aliyarov, V. Tailakov
In this article the results of experiments of mobile data transfer in energy-efficient intelligent systems for wastewater purification of thermal power plants are shown. A work, based on experiments of the various types of ozonators development, conducted by the authors, is being considered. The analysis of experiments conducted by authors shows better efficiency of the ozonator with spiral external electrode, compared to cylindrical capacitor, including increase in efficiency because of corona current being directly pro-portional to ozone concentration. Taking into account the electric characteristics of corona discharge on mi-crowires, the ozonators can be constructed with given parameters and could be used on the distances >1.5 meters from control computer with Wi-Fi access point of mobile intelligent system for wastewater treatment of thermal power plants.
{"title":"A Mobile Data Transfer in Energy-Efficient Intelligent Systems for Wastewater Treatment of Thermal Power Plants","authors":"S. Abdreshova, T. Golubeva, S. Konshin, Shabden Bahtaev, B. Aliyarov, V. Tailakov","doi":"10.1109/W-FiCloud.2018.00032","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00032","url":null,"abstract":"In this article the results of experiments of mobile data transfer in energy-efficient intelligent systems for wastewater purification of thermal power plants are shown. A work, based on experiments of the various types of ozonators development, conducted by the authors, is being considered. The analysis of experiments conducted by authors shows better efficiency of the ozonator with spiral external electrode, compared to cylindrical capacitor, including increase in efficiency because of corona current being directly pro-portional to ozone concentration. Taking into account the electric characteristics of corona discharge on mi-crowires, the ozonators can be constructed with given parameters and could be used on the distances >1.5 meters from control computer with Wi-Fi access point of mobile intelligent system for wastewater treatment of thermal power plants.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/w-ficloud.2018.00005
Welcome to the FiCloud Workshops 2018 (W-FiCloud 2018) edition. This year ten workshops and symposia were organized in conjunction with the IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud 2018), the 15th International Conference on Mobile Web and Intelligent Information Systems (MobiWis 2018) and the 4th International Conference on Big Data Innovations and Applications (Innovate-Data 2018). These were held in Barcelona, Spain, during 6–8 August 2018. These include:
{"title":"Message from the FiCloud 2018 Workshops Coordinators","authors":"","doi":"10.1109/w-ficloud.2018.00005","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00005","url":null,"abstract":"Welcome to the FiCloud Workshops 2018 (W-FiCloud 2018) edition. This year ten workshops and symposia were organized in conjunction with the IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud 2018), the 15th International Conference on Mobile Web and Intelligent Information Systems (MobiWis 2018) and the 4th International Conference on Big Data Innovations and Applications (Innovate-Data 2018). These were held in Barcelona, Spain, during 6–8 August 2018. These include:","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00037
Joelle Chamieh, Jassim Al Hamar, Hamad Al-Mohannadi, Mariam Al Hamar, Ahmad Al-Mutlaq, A. Musa
Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mechanism which deters the threats raised by unknown individuals who have deceitful intentions and who aim to deploy unlawful operations such as terrorist attacks. In this context, our proposed BoI model is based on a framework constructed upon an automated machine learning facial expression analysis system which can assist law enforcement agencies who intend to deploy a systematic preventive security approach that aims to reduce the risk of potential unlawful attacks by rogue individuals through the evaluation of their emotional state in relation to their malicious intent.
{"title":"Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities","authors":"Joelle Chamieh, Jassim Al Hamar, Hamad Al-Mohannadi, Mariam Al Hamar, Ahmad Al-Mutlaq, A. Musa","doi":"10.1109/W-FICLOUD.2018.00037","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00037","url":null,"abstract":"Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mechanism which deters the threats raised by unknown individuals who have deceitful intentions and who aim to deploy unlawful operations such as terrorist attacks. In this context, our proposed BoI model is based on a framework constructed upon an automated machine learning facial expression analysis system which can assist law enforcement agencies who intend to deploy a systematic preventive security approach that aims to reduce the risk of potential unlawful attacks by rogue individuals through the evaluation of their emotional state in relation to their malicious intent.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127734317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00008
Sebastian Cruz-Duarte, P. Gaona-García, E. Gaona-García
The following paper proposes a security scheme applied to microgrids, using symmetric and asymmetric encryption algorithms, digital signatures, hash functions, and SSL certificates to comply with confidentiality, authentication, and integrity aspects in a grid implemented with Raspberry Pi 3 nodes. The study presents the evaluation of different encryption modes to establish the final parameters in the construction of a security scheme. The results showed that the OFB encryption mode in AES is the most suitable for the length of common data in the transfer of information within such networks. In addition, the comparison between the symmetric encryption algorithm AES and the asymmetric encryption algorithm RSA showed that AES has significantly more efficient performance over RSA. Finally, the conclusions and future work are presented.
{"title":"Cybersecurity In Microgrids","authors":"Sebastian Cruz-Duarte, P. Gaona-García, E. Gaona-García","doi":"10.1109/W-FICLOUD.2018.00008","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00008","url":null,"abstract":"The following paper proposes a security scheme applied to microgrids, using symmetric and asymmetric encryption algorithms, digital signatures, hash functions, and SSL certificates to comply with confidentiality, authentication, and integrity aspects in a grid implemented with Raspberry Pi 3 nodes. The study presents the evaluation of different encryption modes to establish the final parameters in the construction of a security scheme. The results showed that the OFB encryption mode in AES is the most suitable for the length of common data in the transfer of information within such networks. In addition, the comparison between the symmetric encryption algorithm AES and the asymmetric encryption algorithm RSA showed that AES has significantly more efficient performance over RSA. Finally, the conclusions and future work are presented.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00026
M. Ghazal, Yasmine Abu Haeyeh, Abdelrahman Abed, S. Ghazal
Fatigued or drowsy drivers pose a significant risk of causing life-threatening accidents. Yet, many sleep-deprived drivers are behind the wheels exposing lives to danger. In this paper, we propose a low-cost and real-time embedded system for fatigue detection using convolutional neural networks (CNN). Our system starts by spatially processing the video signal using a real-time face detection algorithm to establish a region of interest and reduce computations. The video signal comes from a camera module mounted on the car dashboard connected to an embedded Linux board set to monitor the driver's eyes. Detected faces are then passed to an optimized fatigue recognition CNN binary classifier to detect the event of fatigued or normal driving. When temporally persistent fatigue is detected, alerts are sent to the driver's smart phone, and to possibly others, for prevention measures to be taken before accidents happen. Our testing shows that the system can robustly detect fatigue and can effectively be deployed to address the problem.
{"title":"Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile Integration","authors":"M. Ghazal, Yasmine Abu Haeyeh, Abdelrahman Abed, S. Ghazal","doi":"10.1109/W-FICLOUD.2018.00026","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00026","url":null,"abstract":"Fatigued or drowsy drivers pose a significant risk of causing life-threatening accidents. Yet, many sleep-deprived drivers are behind the wheels exposing lives to danger. In this paper, we propose a low-cost and real-time embedded system for fatigue detection using convolutional neural networks (CNN). Our system starts by spatially processing the video signal using a real-time face detection algorithm to establish a region of interest and reduce computations. The video signal comes from a camera module mounted on the car dashboard connected to an embedded Linux board set to monitor the driver's eyes. Detected faces are then passed to an optimized fatigue recognition CNN binary classifier to detect the event of fatigued or normal driving. When temporally persistent fatigue is detected, alerts are sent to the driver's smart phone, and to possibly others, for prevention measures to be taken before accidents happen. Our testing shows that the system can robustly detect fatigue and can effectively be deployed to address the problem.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"690 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00036
Hamad Al-Mohannadi, I. Awan, Jassim Al Hamar, Y. Hamar, Mohammad Shah, A. Musa
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS). These solutions will provide a huge number of alarms that produce more are false positives. Therefore, the IDS tool result should be operated by a human intelligent be filtered effectively the huge amount of alerts to identify true positive attacks and perform accordingly to the incident response rule. This requires the IT employees to have enough knowledge and competency on operating IDS, IPS and incident handling. This paper aims to examine the awareness of cyber security threat among all IT employees, focusing on three domains: Knowledge, Monitoring and Prevention.
{"title":"Understanding Awareness of Cyber Security Threat among IT Employees","authors":"Hamad Al-Mohannadi, I. Awan, Jassim Al Hamar, Y. Hamar, Mohammad Shah, A. Musa","doi":"10.1109/W-FiCloud.2018.00036","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00036","url":null,"abstract":"Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS). These solutions will provide a huge number of alarms that produce more are false positives. Therefore, the IDS tool result should be operated by a human intelligent be filtered effectively the huge amount of alerts to identify true positive attacks and perform accordingly to the incident response rule. This requires the IT employees to have enough knowledge and competency on operating IDS, IPS and incident handling. This paper aims to examine the awareness of cyber security threat among all IT employees, focusing on three domains: Knowledge, Monitoring and Prevention.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00038
A. Musa, Hamad Al-Mohannadi, Jassim Alhamar
Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread.
{"title":"Malware Propagation Modelling in Peer-to-Peer Networks: A Review","authors":"A. Musa, Hamad Al-Mohannadi, Jassim Alhamar","doi":"10.1109/W-FICLOUD.2018.00038","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00038","url":null,"abstract":"Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00018
Daichi Kawanami, Masanari Kamoshita, Ryota Kawashima, H. Matsuo
Distributed key-value stores (D-KVS) are critical backbone for SNS and cloud services. Some D-KVS are based on a ring architecture with multiple database nodes to handle large amount of data. Any of them can receive queries from clients, and the node forwards queries to an adequate node if necessary. Therefore, this architecture causes heavy overhead of packet processing for each node.Some D-KVS have adopted fast packet processing frameworks like DPDK, but this is not enough to handle huge amount of requests. We introduce a query aggregation method to D-KVS to reduce the network traffic. In our approach, client queries are aggregated into a few large-sized query packets by a centralized proxy. The proxy receives every query from the clients, and it routes aggregated queries to the destination nodes. The proxy is built on top of DPDK-based network stack and can deal with the growing of the clients by increasing the number of CPU cores for packet handling. We evaluated with the environment of three Cassandra nodes linked with 10 Gbps network. Our approach improved throughput by 19% compared with the non-proxy Cassandra.
{"title":"A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores","authors":"Daichi Kawanami, Masanari Kamoshita, Ryota Kawashima, H. Matsuo","doi":"10.1109/W-FICLOUD.2018.00018","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00018","url":null,"abstract":"Distributed key-value stores (D-KVS) are critical backbone for SNS and cloud services. Some D-KVS are based on a ring architecture with multiple database nodes to handle large amount of data. Any of them can receive queries from clients, and the node forwards queries to an adequate node if necessary. Therefore, this architecture causes heavy overhead of packet processing for each node.Some D-KVS have adopted fast packet processing frameworks like DPDK, but this is not enough to handle huge amount of requests. We introduce a query aggregation method to D-KVS to reduce the network traffic. In our approach, client queries are aggregated into a few large-sized query packets by a centralized proxy. The proxy receives every query from the clients, and it routes aggregated queries to the destination nodes. The proxy is built on top of DPDK-based network stack and can deal with the growing of the clients by increasing the number of CPU cores for packet handling. We evaluated with the environment of three Cassandra nodes linked with 10 Gbps network. Our approach improved throughput by 19% compared with the non-proxy Cassandra.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/w-ficloud.2018.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/w-ficloud.2018.00003","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00003","url":null,"abstract":"","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}