首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system 扩频系统中Gold码的互相关指标和多址性能
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323913
O. Wojuola
Spread-spectrum system is a well-researched topic in literature. However, the system loading capacity with respect to its spreading codes is not well known. In this paper, a technique for determining the loading capacity is developed by the author. The concept of cross-correlation index is first introduced for the codes. Using this concept, a technique for predicting the system loading capacity is then developed for a set of Gold codes. This work involves the proposal of a mathematical model for the cross-correlation index, and the use of the same for the prediction of the loading capacity and system bit-error-rate performance. The model was tested for various set of Gold codes. Results for a set of 255-chip Gold codes are presented here. The results show that the codes have the capacity to support a maximum of about 15 users, above which bit-error-rate increases rapidly, ultimately resulting in emergence of error floor. The point at which the cross-correlation index equals to auto-correlation index marks the turning point around which the system performance revolves.
扩频系统是文献中研究较多的一个课题。然而,系统对其扩频码的承载能力尚不清楚。本文提出了一种确定承载能力的方法。首先在规范中引入了互相关指标的概念。利用这一概念,为一组Gold代码开发了一种预测系统负载能力的技术。这项工作包括提出一个相互关联指数的数学模型,并使用该模型来预测负载能力和系统误码率性能。该模型经过了各种黄金代码的测试。这里给出了一组255个芯片的Gold代码的结果。结果表明,该码最多支持15个用户,超过15个用户,误码率迅速增加,最终导致错误层的出现。互相关指数等于自相关指数的点标志着系统性能的转折点。
{"title":"Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system","authors":"O. Wojuola","doi":"10.23919/ICACT.2018.8323913","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323913","url":null,"abstract":"Spread-spectrum system is a well-researched topic in literature. However, the system loading capacity with respect to its spreading codes is not well known. In this paper, a technique for determining the loading capacity is developed by the author. The concept of cross-correlation index is first introduced for the codes. Using this concept, a technique for predicting the system loading capacity is then developed for a set of Gold codes. This work involves the proposal of a mathematical model for the cross-correlation index, and the use of the same for the prediction of the loading capacity and system bit-error-rate performance. The model was tested for various set of Gold codes. Results for a set of 255-chip Gold codes are presented here. The results show that the codes have the capacity to support a maximum of about 15 users, above which bit-error-rate increases rapidly, ultimately resulting in emergence of error floor. The point at which the cross-correlation index equals to auto-correlation index marks the turning point around which the system performance revolves.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
TSSA: A two step scheduling algorithm for the event-driven clusters TSSA:用于事件驱动集群的两步调度算法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323689
Yu Chen, Mingming Sun
The event-driven programming model has been proposed to efficiently process iterative applications and incremental applications. In clusters based the event-driven model, applications are structured as a series of short triggers, each of which will be invoked when associate events are trigged. And framework assigns a newly submitted trigger to a node where the relevant datasets set. Unfortunately it may lead to load imbalance because associate events may occur by chance. Numerous triggers in a node may be simultaneously invoked but other nodes have no triggers running. To the end, we provide TSSA, a new two steps event-driven for the event-driven clusters to maximize improve the utilization of node resources. Our results indicate TSSA performs well, and minimizes total execution time of applications.
为了有效地处理迭代应用和增量应用,提出了事件驱动的编程模型。在基于事件驱动模型的集群中,应用程序被构造为一系列短触发器,当关联事件被触发时,每个短触发器都会被调用。框架将新提交的触发器分配给相关数据集集合的节点。不幸的是,它可能导致负载不平衡,因为关联事件可能偶然发生。一个节点中的多个触发器可以同时被调用,但其他节点没有正在运行的触发器。最后,我们为事件驱动集群提供了一种新的两步事件驱动TSSA,以最大限度地提高节点资源的利用率。我们的结果表明,TSSA性能良好,并且最小化了应用程序的总执行时间。
{"title":"TSSA: A two step scheduling algorithm for the event-driven clusters","authors":"Yu Chen, Mingming Sun","doi":"10.23919/ICACT.2018.8323689","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323689","url":null,"abstract":"The event-driven programming model has been proposed to efficiently process iterative applications and incremental applications. In clusters based the event-driven model, applications are structured as a series of short triggers, each of which will be invoked when associate events are trigged. And framework assigns a newly submitted trigger to a node where the relevant datasets set. Unfortunately it may lead to load imbalance because associate events may occur by chance. Numerous triggers in a node may be simultaneously invoked but other nodes have no triggers running. To the end, we provide TSSA, a new two steps event-driven for the event-driven clusters to maximize improve the utilization of node resources. Our results indicate TSSA performs well, and minimizes total execution time of applications.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development trend of insider anomaly detection system 内部异常检测系统的发展趋势
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323761
Minkyu Kim, Kihwan Kim, Hoonjae Lee
Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods to detect people's abnormal behaviour. This paper surveys trends and forecasts of the intrusion detection techniques by categorizing into basic software and machine learning technique.
近期,行业和国家基础设施因内部泄露和关键数据泄露而遭受经济损失。因此,许多公司不仅采用物理的外部和内部渗透方法,还采用软件、机器学习等方法来检测人们的异常行为。本文将入侵检测技术分为基础软件技术和机器学习技术,概述了入侵检测技术的发展趋势和预测。
{"title":"Development trend of insider anomaly detection system","authors":"Minkyu Kim, Kihwan Kim, Hoonjae Lee","doi":"10.23919/ICACT.2018.8323761","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323761","url":null,"abstract":"Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods to detect people's abnormal behaviour. This paper surveys trends and forecasts of the intrusion detection techniques by categorizing into basic software and machine learning technique.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
General labelled data generator framework for network machine learning 用于网络机器学习的通用标记数据生成器框架
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323669
Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han
Artificial Intelligence (AI) technology has made remarkable achievements in various fields. Especially, deep learning technology that is the representative technology of AI, showed high accuracy in speech recognition, image recognition, pattern recognition, natural language processing and translation. In addition, there are many interesting research results such as art, literature and music that cannot be distinguished whether it was made by human or AI. In the field of networks, attempts to solve problems that have not been able to be solved or complex problems using AI have started to become a global trend. However, there is a lack of data sets to apply machine learning to the network and it is difficult to know network problem to solve. So far, there have been a lot of efforts to study network machine learning, but there are few studies to make a necessary dataset. In this paper, we introduce basic network machine learning technology and propose a method to easily generate data for network machine learning. Based on the data generation framework proposed in this paper, the results of automatic generation of labelled data and the results of learning and inferencing from the corresponding dataset are also provided.
人工智能(AI)技术在各个领域取得了令人瞩目的成就。特别是作为人工智能代表技术的深度学习技术,在语音识别、图像识别、模式识别、自然语言处理和翻译等方面表现出了较高的准确率。此外,还有许多有趣的研究成果,如艺术,文学和音乐,无法区分它是由人类还是人工智能制作的。在网络领域,尝试用人工智能解决无法解决的问题或复杂的问题已经开始成为一种全球趋势。然而,缺乏将机器学习应用于网络的数据集,并且很难知道要解决的网络问题。到目前为止,已经有很多研究网络机器学习的努力,但很少有研究可以制作必要的数据集。本文介绍了网络机器学习的基本技术,并提出了一种易于生成网络机器学习数据的方法。在本文提出的数据生成框架的基础上,给出了标注数据的自动生成结果以及相应数据集的学习和推理结果。
{"title":"General labelled data generator framework for network machine learning","authors":"Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han","doi":"10.23919/ICACT.2018.8323669","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323669","url":null,"abstract":"Artificial Intelligence (AI) technology has made remarkable achievements in various fields. Especially, deep learning technology that is the representative technology of AI, showed high accuracy in speech recognition, image recognition, pattern recognition, natural language processing and translation. In addition, there are many interesting research results such as art, literature and music that cannot be distinguished whether it was made by human or AI. In the field of networks, attempts to solve problems that have not been able to be solved or complex problems using AI have started to become a global trend. However, there is a lack of data sets to apply machine learning to the network and it is difficult to know network problem to solve. So far, there have been a lot of efforts to study network machine learning, but there are few studies to make a necessary dataset. In this paper, we introduce basic network machine learning technology and propose a method to easily generate data for network machine learning. Based on the data generation framework proposed in this paper, the results of automatic generation of labelled data and the results of learning and inferencing from the corresponding dataset are also provided.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"5 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PAPR reduction in FBMC-OQAM signals with half complexity of trellis-based SLM 栅格SLM二分之一复杂度的FBMC-OQAM信号PAPR降低
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323623
Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang
The filter Bank Multicarrier (FBMC) modulation with offset-QAM (OQAM) has attracted attention as a major candidate for future wireless communication systems which has several advantages. A disadvantage of FBMC-OQAM is high peak-to-average power ratio (PAPR). To overcome this problem, the trellis-based SLM technique is employed and achieved a much better PAPR reduction performance. However, The Trellis-based algorithm has also the intrinsic disadvantage of high computational complexity, to decreasing the complexity will make the system more desirable. This paper proposes the half-complexity algorithm for trellis-based SLM scheme which achieves lower computational complexity when compared to trellis-based SLM scheme with small degradation of PAPR reduction performance. From various simulation results, the proposed algorithm shows less computational complexity about 50% compared to the trellis-based algorithm with similar PAPR reduction performance.
带偏置qam (OQAM)的滤波器组多载波(FBMC)调制作为未来无线通信系统的主要候选方案受到了广泛的关注。FBMC-OQAM的缺点是峰值平均功率比(PAPR)高。为了克服这一问题,采用了基于栅格的SLM技术,取得了较好的PAPR降低性能。然而,基于网格的算法也有计算复杂度高的固有缺点,降低复杂度会使系统更理想。本文提出了基于栅格的SLM方案的半复杂度算法,与基于栅格的SLM方案相比,该算法的计算复杂度较低,且PAPR降频性能下降较小。从各种仿真结果来看,该算法与基于网格的算法相比,计算复杂度降低了50%左右,具有相似的PAPR降低性能。
{"title":"PAPR reduction in FBMC-OQAM signals with half complexity of trellis-based SLM","authors":"Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang","doi":"10.23919/ICACT.2018.8323623","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323623","url":null,"abstract":"The filter Bank Multicarrier (FBMC) modulation with offset-QAM (OQAM) has attracted attention as a major candidate for future wireless communication systems which has several advantages. A disadvantage of FBMC-OQAM is high peak-to-average power ratio (PAPR). To overcome this problem, the trellis-based SLM technique is employed and achieved a much better PAPR reduction performance. However, The Trellis-based algorithm has also the intrinsic disadvantage of high computational complexity, to decreasing the complexity will make the system more desirable. This paper proposes the half-complexity algorithm for trellis-based SLM scheme which achieves lower computational complexity when compared to trellis-based SLM scheme with small degradation of PAPR reduction performance. From various simulation results, the proposed algorithm shows less computational complexity about 50% compared to the trellis-based algorithm with similar PAPR reduction performance.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Advanced LTE network deployment methodology: A case study for Dakar region 先进的LTE网络部署方法:达喀尔地区的案例研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323819
Antoine Gnansounou, S. Ouya, Raimy Abd. Toure
This work describes the dimensioning process of LTE access network for an ISP, its models, methods and the tool used to dimension the network. LTE is a system with larger bandwidths (up to 20 MHz), low latency and Packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink. Radio access technology for LTE is OFDM (Orthogonal frequency division multiplexing) that provides higher spectral efficiency and more robustness against mulitpath and fading, as compared to CDMA (Code division multiple access). In order to offer the operators increased flexibility in network deployment, the LTE system supports bandwidth scalability and both FDD and TDD duplexing methods. The main objectives of our research was the identification of LTE features relevant for the dimensioning, to define the basic models for Access Network Dimensioning to estimate Coverage needs of the infrastructure, the Network Element Count Estimation and the Capacity Evaluation.
本文描述了ISP LTE接入网的量纲化过程、量纲化模型、量纲化方法和量纲化工具。LTE是一种具有更大带宽(高达20mhz)、低延迟和分组优化的无线接入技术的系统,下行链路的峰值数据速率为100mbps,上行链路的峰值数据速率为50mbps。LTE的无线接入技术是OFDM(正交频分复用),与CDMA(码分多址)相比,它提供了更高的频谱效率和更强的抗多径和衰落的鲁棒性。为了给运营商提供更大的网络部署灵活性,LTE系统支持带宽可扩展性以及FDD和TDD双工方法。我们研究的主要目标是确定与维度相关的LTE特征,定义接入网维度的基本模型,以估计基础设施的覆盖需求,网络元素计数估计和容量评估。
{"title":"Advanced LTE network deployment methodology: A case study for Dakar region","authors":"Antoine Gnansounou, S. Ouya, Raimy Abd. Toure","doi":"10.23919/ICACT.2018.8323819","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323819","url":null,"abstract":"This work describes the dimensioning process of LTE access network for an ISP, its models, methods and the tool used to dimension the network. LTE is a system with larger bandwidths (up to 20 MHz), low latency and Packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink. Radio access technology for LTE is OFDM (Orthogonal frequency division multiplexing) that provides higher spectral efficiency and more robustness against mulitpath and fading, as compared to CDMA (Code division multiple access). In order to offer the operators increased flexibility in network deployment, the LTE system supports bandwidth scalability and both FDD and TDD duplexing methods. The main objectives of our research was the identification of LTE features relevant for the dimensioning, to define the basic models for Access Network Dimensioning to estimate Coverage needs of the infrastructure, the Network Element Count Estimation and the Capacity Evaluation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of digital optical D flip flop based on photonic micro-ring resonator 基于光子微环谐振器的数字光学D触发器的演示
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323855
Law Foo Kui, M. R. Uddin
In this paper, we demonstrated an optical D-type flip-flop based on the electro optic switching effect of silicon microring resonator. The operation of the flip flop has been verified by simulation using a clock signal of 10 Gbps and data signal of 1 Gbps. The results of the proposed flip-flop have been presented by the timing diagrams.
在本文中,我们展示了一个基于硅微环谐振器电光开关效应的光学d型触发器。通过时钟信号为10gbps,数据信号为1gbps的仿真验证了触发器的工作原理。所提出的触发器的结果已由时序图给出。
{"title":"Demonstration of digital optical D flip flop based on photonic micro-ring resonator","authors":"Law Foo Kui, M. R. Uddin","doi":"10.23919/ICACT.2018.8323855","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323855","url":null,"abstract":"In this paper, we demonstrated an optical D-type flip-flop based on the electro optic switching effect of silicon microring resonator. The operation of the flip flop has been verified by simulation using a clock signal of 10 Gbps and data signal of 1 Gbps. The results of the proposed flip-flop have been presented by the timing diagrams.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS MCPS中生物可识别模态欺骗认知检测的选择性模糊集成学习器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323645
Nishat I. Mowla, Inshil Doh, K. Chae
Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. Simultaneously various spoofing approaches have also been developed over time, which are capable of failing traditional biometric detection systems. Image synthesis with play-doh, gelatin, ecoflex etc. are some of the ways used in spoofing bio-identifiable property. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. This is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. Therefore, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-identifiable modality spoofing. Our proposal is verified on real dataset, LiveDet 2015, with a focus on fingerprint modality spoofing detection that can be used for authentication in Medical Cyber Physical Systems (MCPS).
生物特征被广泛用于用户认证,对国家和全球技术系统同样重要。各种形式的生物特征,如面部、虹膜、指纹,是常用的,最近手掌、静脉和步态也受到关注。同时,随着时间的推移,各种欺骗方法也被开发出来,这些方法可能会失败传统的生物识别检测系统。用橡皮泥、明胶、ecooflex等合成图像是一些用于欺骗生物可识别特性的方法。传统检测系统的成功与定制解决方案有关,必须为每种攻击类型开发特征工程。当我们考虑到无数的攻击可能性时,这不是一个可行的过程。此外,攻击中的一个微小变化可能导致整个系统被重新设计,从而成为一个限制性约束。最近机器学习的成功激发了本文使用AdaBoost探索集成学习方法的弱学习器和强学习器。因此,本文提出了一种采用Ada Boost、特征选择和弱学习器与强学习器相结合的选择性集成模糊学习器方法来增强对生物可识别模态欺骗的检测。我们的建议在真实数据集LiveDet 2015上进行了验证,重点是指纹模态欺骗检测,可用于医疗网络物理系统(MCPS)的身份验证。
{"title":"Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS","authors":"Nishat I. Mowla, Inshil Doh, K. Chae","doi":"10.23919/ICACT.2018.8323645","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323645","url":null,"abstract":"Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. Simultaneously various spoofing approaches have also been developed over time, which are capable of failing traditional biometric detection systems. Image synthesis with play-doh, gelatin, ecoflex etc. are some of the ways used in spoofing bio-identifiable property. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. This is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. Therefore, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-identifiable modality spoofing. Our proposal is verified on real dataset, LiveDet 2015, with a focus on fingerprint modality spoofing detection that can be used for authentication in Medical Cyber Physical Systems (MCPS).","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The dynamic analysis of WannaCry ransomware WannaCry勒索软件的动态分析
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323679
Da-Yu Kao, Shou-Ching Hsiao
The global ransomware cyberattacks cripples the national hospital system across the United Kingdom, and causes waves of appointments and operations to be cancelled. Similar attacking methods have come to sweep over the world. Such trend of highprofile cyberattack sheds the lights on rapid defence through the malware information sharing platform. A complete malware analysis process is quite a time-consuming campaign. The dynamic analysis of WannaCry ransomware explores behavioural indicators and extracts important IOCs (Indicators of Compromise). Utilizing Yara tool to create customized patterns is useful for malware information sharing mechanism. Also, such mechanism help reduce time and human resource spent on detecting or finding similar malware families. We aim to generate effective cyber threat intelligence by formulating collected IOCs into structured formations. The positive effects show on immediate defensive response to security breaches, and meanwhile the integrated information security protection is consolidated.
全球勒索软件网络攻击使英国的国家医院系统瘫痪,并导致一波又一波的预约和手术被取消。类似的攻击方法已经席卷全球。这种网络攻击的高发趋势,揭示了通过恶意软件信息共享平台进行快速防御的必要性。一个完整的恶意软件分析过程是相当耗时的。对WannaCry勒索软件的动态分析探索了行为指标并提取了重要的ioc(妥协指标)。利用Yara工具创建自定义模式对恶意软件信息共享机制非常有用。此外,这种机制有助于减少在检测或查找类似恶意软件家族上花费的时间和人力资源。我们的目标是通过将收集到的ioc形成结构化的编队来生成有效的网络威胁情报。对安全漏洞的即时防御反应显示出积极的效果,同时也巩固了信息安全的综合防护。
{"title":"The dynamic analysis of WannaCry ransomware","authors":"Da-Yu Kao, Shou-Ching Hsiao","doi":"10.23919/ICACT.2018.8323679","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323679","url":null,"abstract":"The global ransomware cyberattacks cripples the national hospital system across the United Kingdom, and causes waves of appointments and operations to be cancelled. Similar attacking methods have come to sweep over the world. Such trend of highprofile cyberattack sheds the lights on rapid defence through the malware information sharing platform. A complete malware analysis process is quite a time-consuming campaign. The dynamic analysis of WannaCry ransomware explores behavioural indicators and extracts important IOCs (Indicators of Compromise). Utilizing Yara tool to create customized patterns is useful for malware information sharing mechanism. Also, such mechanism help reduce time and human resource spent on detecting or finding similar malware families. We aim to generate effective cyber threat intelligence by formulating collected IOCs into structured formations. The positive effects show on immediate defensive response to security breaches, and meanwhile the integrated information security protection is consolidated.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink 基于模糊逻辑的聚类与移动sink相结合提高无线传感器网络的网络寿命
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323665
Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam
The issues related to energy consumption and prolonging the lifetime of wireless sensor networks(WSNs) have been studied. The deployment of a transceiver station in a WSN is a major concern. Supposing the base stations are static (fixed), however they are capable of moving in some situations to collect data from sensor nodes. In order to achieve higher energy efficiency results, the mobility of the base station to increase the lifetime of the WSN is considered in this article. We propose a strategy that combines moving sinks by fixed-path sink with fuzzy clustering algorithm that results the proposed algorithm has better performance in terms of network life, stability and packet delivery compared to Leach, Cluster Head Election mechanism using Fuzzy logic (CHEF) in performance evaluation through simulation software MATLAB.
对无线传感器网络的能量消耗和寿命延长等问题进行了研究。无线传感器网络中收发站的部署是一个主要问题。假设基站是静态的(固定的),但是它们能够在某些情况下移动以从传感器节点收集数据。为了达到更高的能效效果,本文考虑了基站的移动性来增加无线传感器网络的寿命。我们提出了一种将固定路径sink移动sink与模糊聚类算法相结合的策略,通过仿真软件MATLAB进行性能评价,结果表明所提出的算法在网络寿命、稳定性和数据包传输方面都优于采用模糊逻辑(CHEF)的Leach、Cluster Head Election机制。
{"title":"Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink","authors":"Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam","doi":"10.23919/ICACT.2018.8323665","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323665","url":null,"abstract":"The issues related to energy consumption and prolonging the lifetime of wireless sensor networks(WSNs) have been studied. The deployment of a transceiver station in a WSN is a major concern. Supposing the base stations are static (fixed), however they are capable of moving in some situations to collect data from sensor nodes. In order to achieve higher energy efficiency results, the mobility of the base station to increase the lifetime of the WSN is considered in this article. We propose a strategy that combines moving sinks by fixed-path sink with fuzzy clustering algorithm that results the proposed algorithm has better performance in terms of network life, stability and packet delivery compared to Leach, Cluster Head Election mechanism using Fuzzy logic (CHEF) in performance evaluation through simulation software MATLAB.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"55 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1