首页 > 最新文献

2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

英文 中文
Determination of Optimum Threshold Values for NPRACH Preamble Detection in NB-IoT Systems NB-IoT系统中NPRACH前导检测的最佳阈值确定
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436646
S. Cho, Hyungjin Kim, Gweondo Jo
In this paper, we describe the NPRACH of 3GPP NB-IoT system and propose a possible receiver algorithm for NPRACH detection and timing advance estimation. We present simulation results for the performance of the random access preamble detection and timing advance for the proposed NPRACH detection scheme. In addition, we analyze the detection performance according to the detection threshold value and derive the optimal threshold value.
本文描述了3GPP NB-IoT系统的NPRACH,并提出了一种可能用于NPRACH检测和时序预估的接收机算法。我们对所提出的NPRACH检测方案的随机接入前导检测和时序提前性能进行了仿真。此外,根据检测阈值对检测性能进行了分析,得出了最优阈值。
{"title":"Determination of Optimum Threshold Values for NPRACH Preamble Detection in NB-IoT Systems","authors":"S. Cho, Hyungjin Kim, Gweondo Jo","doi":"10.1109/ICUFN.2018.8436646","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436646","url":null,"abstract":"In this paper, we describe the NPRACH of 3GPP NB-IoT system and propose a possible receiver algorithm for NPRACH detection and timing advance estimation. We present simulation results for the performance of the random access preamble detection and timing advance for the proposed NPRACH detection scheme. In addition, we analyze the detection performance according to the detection threshold value and derive the optimal threshold value.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Mediation Gateway for Heterogenous IoT Services Harmonization 异构物联网服务协调的服务中介网关
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437044
S. Kum, Jaewon Moon
To populate IoT service, having remote control on a smart device is not enough. More complicated IoT services are needed by combining each IoT service, and enabling communication between independent services are essential to them. There are several solutions and services to provide interactivity between IoT services in the market such as IFTTT or Muzzley. However, most of these services are implemented on the cloud, which makes it difficult to get prompt response for application request. In this paper, a Service Mediation Gateway is proposed to improve connectivity between IoT services with less response time. The proposed gateway is located between IoT services and the application, just like an edge or fog device, and works as a data cache for IoT resources on the cloud. The proposed gateway can be implemented both on the cloud and on the edge, so that provide more prompt response to the application. The proposed gateway has been implemented with existing IoT services, and the comparison with existing cloud services is evaluated.
要普及物联网服务,在智能设备上拥有远程控制是不够的。通过将各个物联网服务组合在一起,需要更复杂的物联网服务,实现独立服务之间的通信是必不可少的。有几种解决方案和服务可以在市场上的物联网服务(如IFTTT或Muzzley)之间提供交互。然而,这些服务大多是在云上实现的,这使得应用程序请求很难得到及时的响应。本文提出了一种服务中介网关,以减少响应时间,提高物联网服务之间的连通性。提议的网关位于物联网服务和应用程序之间,就像边缘或雾设备一样,并作为云上物联网资源的数据缓存。所建议的网关既可以在云中实现,也可以在边缘实现,从而为应用程序提供更快速的响应。提出的网关已经与现有的物联网服务实现,并与现有的云服务进行了比较评估。
{"title":"Service Mediation Gateway for Heterogenous IoT Services Harmonization","authors":"S. Kum, Jaewon Moon","doi":"10.1109/ICUFN.2018.8437044","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437044","url":null,"abstract":"To populate IoT service, having remote control on a smart device is not enough. More complicated IoT services are needed by combining each IoT service, and enabling communication between independent services are essential to them. There are several solutions and services to provide interactivity between IoT services in the market such as IFTTT or Muzzley. However, most of these services are implemented on the cloud, which makes it difficult to get prompt response for application request. In this paper, a Service Mediation Gateway is proposed to improve connectivity between IoT services with less response time. The proposed gateway is located between IoT services and the application, just like an edge or fog device, and works as a data cache for IoT resources on the cloud. The proposed gateway can be implemented both on the cloud and on the edge, so that provide more prompt response to the application. The proposed gateway has been implemented with existing IoT services, and the comparison with existing cloud services is evaluated.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rank Prediction for Portfolio Management Using Artificial Neural Networks 基于人工神经网络的投资组合管理等级预测
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436983
Jiyoon Bae, Ghudae Sim, Hyungbin Yun, Junhee Seok
The rank of equities is often used to determine the investment portfolio instead of prices because ranking is in general believed to be robust. In this paper, we propose a rank prediction method for portfolio management using ANN. While an ANN requires a large dataset to train the model, the sample size is usually insufficient in stock market data. Therefore, the proposed method uses data augmentation and an ensemble ANN model. In the simulation study, the proposed method shows 13 percentage of performance improvement from the other methods to predict the profit rank of equities in South-East Asian market.
股票的排名通常被用来决定投资组合,而不是价格,因为排名通常被认为是稳健的。本文提出了一种基于人工神经网络的投资组合管理等级预测方法。虽然人工神经网络需要一个大的数据集来训练模型,但股票市场数据的样本量通常是不足的。因此,该方法采用了数据增强和集成人工神经网络模型。在模拟研究中,所提出的方法在预测东南亚市场股票的利润等级方面比其他方法提高了13个百分点。
{"title":"Rank Prediction for Portfolio Management Using Artificial Neural Networks","authors":"Jiyoon Bae, Ghudae Sim, Hyungbin Yun, Junhee Seok","doi":"10.1109/ICUFN.2018.8436983","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436983","url":null,"abstract":"The rank of equities is often used to determine the investment portfolio instead of prices because ranking is in general believed to be robust. In this paper, we propose a rank prediction method for portfolio management using ANN. While an ANN requires a large dataset to train the model, the sample size is usually insufficient in stock market data. Therefore, the proposed method uses data augmentation and an ensemble ANN model. In the simulation study, the proposed method shows 13 percentage of performance improvement from the other methods to predict the profit rank of equities in South-East Asian market.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memory-Efficient Random Forest Generation Method for Network Intrusion Detection 基于内存高效随机森林的网络入侵检测方法
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436590
Seok-Hwan Choi, DongHyun Ko, SeonJin Hwang, Yoon-Ho Choi
Along with the steady growth of wired and wireless networks, the various new attacks targeting networks are also constantly emerging and transforming. As a efficient way to cope with various attacks, the Random Forest(RF) algorithm has frequently been used as the core engine of intrusion detection because of the faster learning speed and the higher attack detection accuracy. However, the RF algorithm has to input the number of the tree composing the forest as a parameter. In this paper, we proposed a new algorithm that limit the number of trees composing the forest using the McNemar test. To evaluate the performance of the proposed RF algorithm, we compared learning time, accuracy and memory usage of the proposed algorithm with the original RF algorithm and other algorithm by using the KDDcup99 dataset. Under the same detection accuracy, the proposed RF algorithm improves the performance of the original RF algorithm by as much as 97.76% at learning time, 91.86% at test time, and 99.02% in memory usage on average.
随着有线和无线网络的稳步发展,各种针对网络的新型攻击方式也在不断涌现和转变。随机森林(Random Forest, RF)算法作为一种有效应对各种攻击的方法,由于其更快的学习速度和更高的攻击检测精度,被频繁地用作入侵检测的核心引擎。然而,RF算法必须输入组成森林的树的数量作为参数。在本文中,我们提出了一种新的算法,利用McNemar测试来限制组成森林的树的数量。为了评估所提出的射频算法的性能,我们使用KDDcup99数据集,将所提出算法的学习时间、精度和内存使用情况与原始射频算法和其他算法进行了比较。在检测精度相同的情况下,本文算法在学习时的性能比原算法提高97.76%,在测试时提高91.86%,在内存利用率上平均提高99.02%。
{"title":"Memory-Efficient Random Forest Generation Method for Network Intrusion Detection","authors":"Seok-Hwan Choi, DongHyun Ko, SeonJin Hwang, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436590","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436590","url":null,"abstract":"Along with the steady growth of wired and wireless networks, the various new attacks targeting networks are also constantly emerging and transforming. As a efficient way to cope with various attacks, the Random Forest(RF) algorithm has frequently been used as the core engine of intrusion detection because of the faster learning speed and the higher attack detection accuracy. However, the RF algorithm has to input the number of the tree composing the forest as a parameter. In this paper, we proposed a new algorithm that limit the number of trees composing the forest using the McNemar test. To evaluate the performance of the proposed RF algorithm, we compared learning time, accuracy and memory usage of the proposed algorithm with the original RF algorithm and other algorithm by using the KDDcup99 dataset. Under the same detection accuracy, the proposed RF algorithm improves the performance of the original RF algorithm by as much as 97.76% at learning time, 91.86% at test time, and 99.02% in memory usage on average.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automated System Recovery Using BlockChain 使用区块链实现系统自动恢复
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437040
S. Bae, Yongtae Shin
The existing Disaster Recovery(DR) system has a technique for integrity of the duplicated file to be used for recovery, but it could not be used if the file was changed. In this study, a duplicate file is generated as a block and managed as a block-chain. If the duplicate file is corrupted, the DR system will check the integrity of the duplicated file by referring to the block-chain and proceed with the recovery. The proposed technology is verified through recovery performance evaluation and scenarios.
现有的灾难恢复(DR)系统具有用于恢复的复制文件的完整性技术,但是如果文件被更改,则无法使用该技术。在本研究中,复制文件作为块生成,并作为块链进行管理。如果重复文件损坏,容灾系统会参考区块链检查重复文件的完整性,然后进行恢复。通过采收率评价和场景验证了该技术的可行性。
{"title":"An Automated System Recovery Using BlockChain","authors":"S. Bae, Yongtae Shin","doi":"10.1109/ICUFN.2018.8437040","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437040","url":null,"abstract":"The existing Disaster Recovery(DR) system has a technique for integrity of the duplicated file to be used for recovery, but it could not be used if the file was changed. In this study, a duplicate file is generated as a block and managed as a block-chain. If the duplicate file is corrupted, the DR system will check the integrity of the duplicated file by referring to the block-chain and proceed with the recovery. The proposed technology is verified through recovery performance evaluation and scenarios.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spectrogram-Based Automatic Modulation Recognition Using Convolutional Neural Network 基于频谱图的卷积神经网络自动调制识别
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436654
Sinjin Jeong, Uhyeon Lee, S. Kim
We study a system for classifying modulation types with spectrograms obtained through short-time Fourier transform. AWGN-based carrier modulated signals and their spectrograms are generated. In order to extract features from spectrogram automatically, we learned our convolutional neural network model with the generated data. Even at low SNRs, the performance is fairly good, but additional modulation type applications and comparisons with others in various environments are necessary.
研究了一种利用短时傅里叶变换得到的频谱图对调制类型进行分类的系统。生成基于awgn的载波调制信号及其频谱图。为了从谱图中自动提取特征,我们利用生成的数据学习卷积神经网络模型。即使在低信噪比下,性能也相当好,但需要额外的调制类型应用和在各种环境下与其他调制类型进行比较。
{"title":"Spectrogram-Based Automatic Modulation Recognition Using Convolutional Neural Network","authors":"Sinjin Jeong, Uhyeon Lee, S. Kim","doi":"10.1109/ICUFN.2018.8436654","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436654","url":null,"abstract":"We study a system for classifying modulation types with spectrograms obtained through short-time Fourier transform. AWGN-based carrier modulated signals and their spectrograms are generated. In order to extract features from spectrogram automatically, we learned our convolutional neural network model with the generated data. Even at low SNRs, the performance is fairly good, but additional modulation type applications and comparisons with others in various environments are necessary.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System uC/OS实时操作系统漏洞分析与缓解研究
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436965
Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho
Programmable Logic Controllers (PLCs) have been widely used in real-time and embedded control applications including safety-critical control systems. Due to their ubiquity and network connectivity, PLCs are prone to various security attacks. Buffer overflow attacks, which target software vulnerabilities in operating system (OS) and application software, are the most common security attacks because of their relatively easy exploitation. Therefore, it is important to have knowledge about software vulnerabilities in OSs for PLCs in order to prevent or mitigate them in PLC design and implementation. Many PLCs use Micrium uC/OS as their OS. In this paper, we present an approach to analyzing and mitigating some software two vulnerabilities, buffer overflows and integer overflows in uC/OS. We first check if there are vulnerable functions in uC/OS system. We then propose a technique to prevent or mitigate the vulnerabilities associated with the functions.
可编程逻辑控制器(plc)已广泛应用于实时和嵌入式控制应用,包括安全关键控制系统。plc由于其无处不在和网络连接性,容易受到各种安全攻击。缓冲区溢出攻击以操作系统和应用软件的软件漏洞为攻击目标,是最常见的安全攻击,其利用起来相对容易。因此,了解PLC操作系统中的软件漏洞是很重要的,以便在PLC设计和实现中预防或减轻它们。许多plc使用microum uC/OS作为其操作系统。本文提出了一种分析和减少uC/OS中缓冲区溢出和整数溢出这两个软件漏洞的方法。我们首先检查uC/OS系统中是否存在易受攻击的功能。然后,我们提出了一种技术来防止或减轻与函数相关的漏洞。
{"title":"Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System","authors":"Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho","doi":"10.1109/ICUFN.2018.8436965","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436965","url":null,"abstract":"Programmable Logic Controllers (PLCs) have been widely used in real-time and embedded control applications including safety-critical control systems. Due to their ubiquity and network connectivity, PLCs are prone to various security attacks. Buffer overflow attacks, which target software vulnerabilities in operating system (OS) and application software, are the most common security attacks because of their relatively easy exploitation. Therefore, it is important to have knowledge about software vulnerabilities in OSs for PLCs in order to prevent or mitigate them in PLC design and implementation. Many PLCs use Micrium uC/OS as their OS. In this paper, we present an approach to analyzing and mitigating some software two vulnerabilities, buffer overflows and integer overflows in uC/OS. We first check if there are vulnerable functions in uC/OS system. We then propose a technique to prevent or mitigate the vulnerabilities associated with the functions.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Relay-Based iBGP Multicasting in Software Defined Networks 软件定义网络中基于中继的iBGP组播
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437020
U. Bassey, A. Nayak
In the Internet today, learnt prefixes are forwarded within autonomous systems (ASs) over internal Border Gateway Protocol (iBGP) sessions. Existing schemes for iBGP routing include the full-mesh (FM) solution, route reflection (RR) solution and confederation. Optimal prefix routing and route diversity are the main strength of the FM solution. However, it is rarely employed in a large networks due to its poor scalability. The RR scheme solves the scalability challenge at the cost of FM optimality due to Route Reflector's partial view of the network. The concept of Software Defined Networking (SDN) entails decoupling of the control plane from the forwarding plane such that the control plane is logically centralized benefiting from an overall knowledge of the network for decision making. In this work, we propose a solution based on multicasting which employs relay nodes in the iBGP message dissemination. The relay nodes are elected and act as boundaries of multicast groups, relaying and filtering prefixes into other multicast groups. We evaluate the use of single and multiple relay nodes per multicast group. Our solution brings session management scalability and minimization of duplicate prefix announcement through elimination of peer sessions deemed unnecessary. SDN controller is employed to configure and coordinate the multicast tree.
在今天的互联网上,学习到的前缀通过内部边界网关协议(iBGP)会话在自治系统(as)内转发。现有的iBGP路由方案包括full-mesh (FM)方案、route reflection (RR)方案和confederation(联盟)方案。最优前缀路由和路由分集是调频方案的主要优点。然而,由于其可扩展性差,在大型网络中很少使用。RR方案解决了可扩展性的挑战,但代价是由于路由反射器对网络的部分视图而牺牲了FM最优性。软件定义网络(SDN)的概念需要将控制平面与转发平面解耦,从而使控制平面在逻辑上集中,从而受益于对网络的总体了解,从而进行决策。在本研究中,我们提出了一种基于组播的解决方案,该方案在iBGP消息传播中使用中继节点。中继节点作为组播组的边界,将前缀转发和过滤到其他组播组。我们评估了每个多播组使用单个和多个中继节点。我们的解决方案通过消除被认为不必要的对等会话,带来了会话管理的可伸缩性和重复前缀公告的最小化。通过SDN控制器对组播树进行配置和协调。
{"title":"Relay-Based iBGP Multicasting in Software Defined Networks","authors":"U. Bassey, A. Nayak","doi":"10.1109/ICUFN.2018.8437020","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437020","url":null,"abstract":"In the Internet today, learnt prefixes are forwarded within autonomous systems (ASs) over internal Border Gateway Protocol (iBGP) sessions. Existing schemes for iBGP routing include the full-mesh (FM) solution, route reflection (RR) solution and confederation. Optimal prefix routing and route diversity are the main strength of the FM solution. However, it is rarely employed in a large networks due to its poor scalability. The RR scheme solves the scalability challenge at the cost of FM optimality due to Route Reflector's partial view of the network. The concept of Software Defined Networking (SDN) entails decoupling of the control plane from the forwarding plane such that the control plane is logically centralized benefiting from an overall knowledge of the network for decision making. In this work, we propose a solution based on multicasting which employs relay nodes in the iBGP message dissemination. The relay nodes are elected and act as boundaries of multicast groups, relaying and filtering prefixes into other multicast groups. We evaluate the use of single and multiple relay nodes per multicast group. Our solution brings session management scalability and minimization of duplicate prefix announcement through elimination of peer sessions deemed unnecessary. SDN controller is employed to configure and coordinate the multicast tree.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Pedestrian Detection Based on Faster R-CNN and Hippocampal Neural Network 基于更快R-CNN和海马神经网络的行人检测研究
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436974
B. Hao, Su-Bin Park, D. Kang
This paper use Faster-RCNN and hippocampal neural network algorithms to research. Firstly use convolutional neural network to extract the features of the input image, and then use Region Proposal Networks to extract the standard frame. Here we can judge whether there are objects in the standard frame and know the location of the standard box, then use the Non-Maximum Suppression to select the standard box, finally perform the classification operation and regression operation. The final classification network is the hippocampal neural network. The hippocampal neural network is a spatial structure model that mimics the hippocampus of human brain.
本文采用Faster-RCNN和海马神经网络算法进行研究。首先使用卷积神经网络提取输入图像的特征,然后使用区域建议网络提取标准帧。在这里我们可以判断标准框中是否有对象,知道标准框的位置,然后使用非最大抑制来选择标准框,最后进行分类运算和回归运算。最后一个分类网络是海马体神经网络。海马体神经网络是一种模仿人脑海马体的空间结构模型。
{"title":"Research on Pedestrian Detection Based on Faster R-CNN and Hippocampal Neural Network","authors":"B. Hao, Su-Bin Park, D. Kang","doi":"10.1109/ICUFN.2018.8436974","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436974","url":null,"abstract":"This paper use Faster-RCNN and hippocampal neural network algorithms to research. Firstly use convolutional neural network to extract the features of the input image, and then use Region Proposal Networks to extract the standard frame. Here we can judge whether there are objects in the standard frame and know the location of the standard box, then use the Non-Maximum Suppression to select the standard box, finally perform the classification operation and regression operation. The final classification network is the hippocampal neural network. The hippocampal neural network is a spatial structure model that mimics the hippocampus of human brain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy 基于移动认证代理的可穿戴设备认证协议
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436650
Doo-Hee Hwang, Jinmyeong Shin, Yoon-Ho Choi
The data transmitted from the wearable device commonly includes sensitive data. So, application service using the data collected from the unauthorized wearable devices can cause serious problems. Also, it is important to authenticate any wearable device and then, protect the transmitted data between the wearable devices and the application server. In this paper, we propose an authentication protocol, which is designed by using the Transport Layer Security (TLS) handshake protocol combined with a mobile authentication proxy. By using the proposed authentication protocol, we can authenticate the wearable device. And we can secure data transmission since session key is shared between the wearable device and the application server. In addition, the proposed authentication protocol is secure even when the mobile authentication proxy is unreliable.
从可穿戴设备传输的数据通常包括敏感数据。因此,应用程序服务使用从未经授权的可穿戴设备收集的数据可能会导致严重的问题。此外,对任何可穿戴设备进行身份验证,然后保护可穿戴设备与应用服务器之间传输的数据也很重要。本文提出了一种基于传输层安全(TLS)握手协议与移动认证代理相结合的认证协议。通过使用所提出的认证协议,我们可以对可穿戴设备进行认证。由于会话密钥在可穿戴设备和应用服务器之间共享,我们可以确保数据传输的安全性。此外,即使在移动认证代理不可靠的情况下,所提出的认证协议也是安全的。
{"title":"Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy","authors":"Doo-Hee Hwang, Jinmyeong Shin, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436650","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436650","url":null,"abstract":"The data transmitted from the wearable device commonly includes sensitive data. So, application service using the data collected from the unauthorized wearable devices can cause serious problems. Also, it is important to authenticate any wearable device and then, protect the transmitted data between the wearable devices and the application server. In this paper, we propose an authentication protocol, which is designed by using the Transport Layer Security (TLS) handshake protocol combined with a mobile authentication proxy. By using the proposed authentication protocol, we can authenticate the wearable device. And we can secure data transmission since session key is shared between the wearable device and the application server. In addition, the proposed authentication protocol is secure even when the mobile authentication proxy is unreliable.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1